We’re going to begin using some of the examples we collect, to share with everyone in an effort to better expose you to ways you can (often times) easily identify phishing emails. And of course, when we receive good phishing examples, we’ll share them as well. Phishy Things (red flags): From Name From Address Phishers
Anti-Phishing Tip of the Day
As part of our Patch Management Policy, August’s security patches and updates were approved for distribution. Additionally, 3rd Party Patches were approved for servers.