Actamos Email Security
  • How it works
  • Pricing
  • Solutions
    • Concierge
  • Blog
  • Resources
    • FAQ
    • Documentation
    • Glossary
  • About
Sign up
  • How it works
  • Pricing
  • Solutions
    • Concierge
  • Blog
  • Resources
    • FAQ
    • Documentation
    • Glossary
  • About
Glossary

Antivirus

…

Attack vector

…

Backscatter email

…

Business Email Compromise (BEC)

…

Bot

…

Botnet

…

Breach

…

BYOD

…

Clickjacking

…

Credential stuffing

…

DKIM (DomainKeys Identified Mail)

…

DoS Attack

…

DDoS Attack

…

DMARC

…

Email spoofing

…

Encryption

…

Exploit

…

Firewall

…

Joe job

…

Malware

…

Pen-testing

…

Phishing Attack

…

Phishing Kit

…

Principle of least privilege (POLP)

…

Protocol

…

Ransomware

…

Sender ID

…

Sender Policy Framework (SPF)

…

SMTP Server

…

Spear Phishing

…

Trojan

…

Virus

…

Worm

…

Comments are closed.

Categories
  • Actamos News
  • Cyberattacks
  • New Features
Recent Posts
  • URL Shortener Spam – What is It and What to Do About It?
  • Realtime Map with Email Incidents
  • Ransomware Attacks Explained in Plain English
  • Welcome to Actamos blog
Tags
computer virus email incidents incident map malware phishing ransomware spam trojans URL shortener
Actamos Team December 4, 2019
Comments Disabled
Resources
FAQ

Total email security for your business. Protect your mailboxes from phishing, ransomware, malware, virus and other cyber attacks and security threats.

Menu
  • How it Works
  • Price Calculator
  • Solutions
  • About Us
  • Legal
Resources
  • Blog
  • Resources
  • FAQ
  • Documentation
  • Glossary
Follow Us
  • Twitter
  • LinkedIn
  • Facebook
  • F6S
  • Crunchbase
© 2020 Actamos, Inc.
  • Privacy Policy
  • Terms of Service
  • GDPR Compliance
By using this website you agree to our Privacy Policy. Find out more.