Privacy
Qboxmail
Security
Solutions

Protect your business emails with Qboxmail

Every email you send or receive contains sensitive data and information that requires the highest level of protection. Are your communications truly secure? In this post, we’ll take you inside our infrastructure. We’ll show you how we ensure the security...

GDPR compliance for corporate email - Security and data protection with regulatory-compliant email hosting solutions
News
Privacy
Security

Compliance Guide for Business Emails

The GDPR(General Data Protection Regulation) is a European Union legislation that regulates the processing of personal data of people within the EU and the European Economic Area (EEA). This regulation sets fundamental principles and rules that companies must follow when...

Illustration on Business Email Compromise (BEC), with hands manipulating an email containing fraudulent requests such as 'execute a bank transfer' and 'send all your passwords'.
News
Privacy
Qboxmail
Security
Solutions

BEC Scams – Business Email Compromise

"Business Email Compromise" (BEC) is an online scam where attackers aim to compromise or forge email communications for financial gain or sensitive information. BEC scam targets company employees, compelling them to take harmful actions like transferring money, resulting in substantial...

This image addresses the retention period for employee email logs, suggesting 7 days as the duration (indicated by "Giorno 7" on the calendar).
Privacy
Security

Clarifications on the Italian Privacy Guarantor’s provision: Email logs are to be retained for a maximum of 7 days.

With a newsletter dated February 6, 2024, the Italian Privacy Guarantor announced that it had prepared a measure with the aim of providing "useful guidance" to both public and private employers regarding the management of email used by their employees....

Mailbombing notice with numerous emails and letters coming out of a mailbox, representing a spam attack or email overload.
Brand
Privacy
Qboxmail
Security
Solutions

Mailbombing: a type of security threat to your email inbox

Mailbombing can threaten the security of your email inbox and disrupt the proper flow of your emails. What's the mailbombing? Mailbombing is a form of cyber attack aimed at overwhelming your email inbox with an enormous volume of unwanted messages. Mailbombing...

Illustration depicting a phishing attack: a hand holds a fishing line with a hook that extracts a document with login from a blue envelope. The document shows a field with asterisks, symbolizing a password. Next to the envelope is a padlock icon and a skull with two crossbones inside two comic icons
Privacy
Security

Social Engineering, concrete examples and how to defend yourself

In the previous post, we introduced the concept of social engineering, exploring how this technique organizes itself, studies its victims, and attacks them. We concluded that the best defense strategy is knowledge. In this new article, we will put these...

We use cookies to provide you a better browsing experience, by continuing you accept their use. For more information visit the Privacy policy page.

Accept