Email Content

If you want, I can walk you through the Defender console here at ITC and you can see some pretty incredible stuff. And with an Individual subscription, you do get a lot of Defender's capability, that would be relevant to a home user.
I do appreciate your generosity good sir! The step before that though is to get past the little matter of funding for the subscription!
  • Like
Reactions: precious

Security vs. Privacy: Which Should Take Precedence?

Your compliance requirements trump all of this. Not every organization has the same requirements, but, for example, an organization operating in California or Virginia will have a greater adherence to privacy than, say, in Florida, as states adopt their own versions of the EU's GDPR guidance.

General statements about security and privacy themselves are overly nebulous until we define what the asset is, its vulnerability, and threats - in other words, a risk assessment. Every individual, every organization must conduct a proper risk assessment along with compliance requirements before the questions of 'how much privacy' and 'how much security' are required.

I don't think it's a matter of which one gets precedence in a general sense, because it will vary in every single use case.
Vulnerability - Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. Note: The term weakness is synonymous for deficiency. Weakness may result in security and/or privacy risks.

Threat - Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.
  • Like
Reactions: precious

Email - Sent to Spam/Junk

Spam Block Lists such as the ones maintained by organizations like Spamhaus can have quite an effect on whether messages get classified as junk/spam/phish, etc.

The MX Toolbox is a good place to check to see if a particular server is on a blocklist for spam/UCE. Properly constructed DMARC and SPF records on the domain level can greatly cut down on the amount of email blocking as a result of an internet blocklist.

Properly constructed DMARC and SPF records on the domain level are definitely part of the equation, but unfortunately, the end user has no access.

Thank you for the URL to the blacklist check.
  • Like
Reactions: precious

What prevents our students from completing their goals

As odd as it sounds, the fear of success is also something that can get in the way. Students fear the potential consequences of succeeding - sort of an exact opposite of the imposter syndrome. Sometimes, when you win, it paints a big bullseye on your back, with people having expectations of you, since you've proven you can do more.

It's a real thing.

Chinese Hackers Accessed US Treasury Workstations

The Chinese government has denied any involvement, calling the accusations baseless
Of course they did.

Not even going to comment further - just going to say - trust another organization with your security and...well:

trombone-pusheen.gif

Reinventing Security Awareness: Key Focus for 2025

Oh, I think security awareness is far more than phishing and passwords. And I'm not so sure they are even in the top five anymore.

Identity Protection is probably the most massive requirement now. Ransomware...malware protection, multi-factor authentication to replace those feeble passwords, are regularly part of security briefings and trainings now.

Email - Sent to Spam/Junk

Spam Block Lists such as the ones maintained by organizations like Spamhaus can have quite an effect on whether messages get classified as junk/spam/phish, etc.

The MX Toolbox is a good place to check to see if a particular server is on a blocklist for spam/UCE. Properly constructed DMARC and SPF records on the domain level can greatly cut down on the amount of email blocking as a result of an internet blocklist.

Security vs. Privacy: Which Should Take Precedence?

Your compliance requirements trump all of this. Not every organization has the same requirements, but, for example, an organization operating in California or Virginia will have a greater adherence to privacy than, say, in Florida, as states adopt their own versions of the EU's GDPR guidance.

General statements about security and privacy themselves are overly nebulous until we define what the asset is, its vulnerability, and threats - in other words, a risk assessment. Every individual, every organization must conduct a proper risk assessment along with compliance requirements before the questions of 'how much privacy' and 'how much security' are required.

I don't think it's a matter of which one gets precedence in a general sense, because it will vary in every single use case.

Filter