This image addresses the retention period for employee email logs, suggesting 7 days as the duration (indicated by "Giorno 7" on the calendar).
Privacy
Security

Clarifications on the Italian Privacy Guarantor’s provision: Email logs are to be retained for a maximum of 7 days.

With a newsletter dated February 6, 2024, the Italian Privacy Guarantor announced that it had prepared a measure with the aim of providing "useful guidance" to both public and private employers regarding the management of email used by their employees....

Mailbombing notice with numerous emails and letters coming out of a mailbox, representing a spam attack or email overload.
Brand
Privacy
Qboxmail
Security
Solutions

Mailbombing: a type of security threat to your email inbox

Mailbombing can threaten the security of your email inbox and disrupt the proper flow of your emails. What's the mailbombing? Mailbombing is a form of cyber attack aimed at overwhelming your email inbox with an enormous volume of unwanted messages. Mailbombing...

Protection against phishing: a pair of scissors cuts a fish hook that tries to steal username and password from an email, with an academic shield symbolizing cybersecurity.
Deliverability
Security

Investing in Cybersecurity: importance of user training

The importance of cyber security in the business environment is undeniable. Investing in advanced technologies and technical solutions is crucial, but without proper staff training, efforts may be in vain. What is the point of investing so much in technical...

A blue safe icon represents secure email storage, accompanied by a golden shield icon and padlock to symbolize data protection and encryption.
Qboxmail
Security
Solutions

Qboxmail for business communication security and efficiency

In today's fast-paced business world, security isn't just a precaution; it's a necessity. The intricate digital ecosystem formed by the connection between devices and individuals underscores the fundamental importance of security. For seamless data sharing, an unwavering commitment to security...

Privacy
Security

Social Engineering, concrete examples and how to defend yourself

In the previous post, we introduced the concept of social engineering, exploring how this technique organizes itself, studies its victims, and attacks them. We concluded that the best defense strategy is knowledge. In this new article, we will put these...

Illustration depicting a phishing attack: a hand holds a fishing line with a hook that extracts a document with login from a blue envelope. The document shows a field with asterisks, symbolizing a password. Next to the envelope is a padlock icon and a skull with two crossbones inside two comic icons
Privacy
Security

Social Engineering, the cyber attack exploiting human weakness

Social engineering is a cunning technique that exploits human weaknesses to carry out attacks and obtain sensitive information for fraudulent purposes. There is no antivirus that can fully protect you from this threat. This technique relies on manipulating people through...

We use cookies to provide you a better browsing experience, by continuing you accept their use. For more information visit the Privacy policy page.

Accept