email

Results 301 - 325 of 1363Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Jan 19, 2018
Any digital device or application can be a vector for a cyberattack, but email is an especially acute problem for many organizations. As individuals or members of organizations, most people rely on email to communicate with colleagues, whether in the next cubicle or across the globe. For many in the business world, 24/7 access to email is routine, and often required. Instant, ubiquitous and inexpensive communication gives us quick access to others in our business and personal lives, but gives criminals easy and direct access to us as well.
Tags : 
phishing, email threats, cyberattack, email protection
    
Mimecast
Published By: Marketo     Published Date: Jun 05, 2014
Nobody wants to get blasted. Commercial email marketing has evolved out of the traditional direct-mail mindset, which is all about big campaigns sent to many, on the marketer’s schedule, not the buyer’s. Popular marketing expressions such as batch and blast, hit the database, and e-shot, certainly don’t have positive connotations. The sentiment behind the words is telling. When you batch and blast, you are essentially admitting that your emails are not individually relevant. The days of batch and blast are numbered. Contemporary subscribers expect personal and relevant emails on a non-disruptive schedule. Download the ebook, Conversations, not Campaigns to learn how you can continuously build engagement with your consumers, one by one, over time!
Tags : 
marketo, marketing automation, crm, marketing automation platform, digital business, change management, lead management
    
Marketo
Published By: Topica     Published Date: May 12, 2011
This whitepaper on creating a successful email is packed full of great tips, strategies and insights into carrying out successful email marketing campaigns!
Tags : 
topica, email marketing, email marketing help, introduction to email marketing, successful email marketing, how to write a better subject line, e-mail design, reputation, spam filter prevention, subscription retention
    
Topica
Published By: Benchmark Email     Published Date: Jul 12, 2012
How do you find your audience? How do you reach them? Who's after your business and what is your ultimate goal? When you've decided to commit to email marketing, Benchmark is ready with a step by step strategy guide.
Tags : 
benchmark, marketing, email, email marketing, bloggers, business, marketing strategy
    
Benchmark Email
Published By: Fitbit     Published Date: Mar 21, 2017
If you’re like most wellness professionals, marketing communication is your most important “side job.” From figuring out when to send emails, identifying the right methods, to designing your communications calendar – it can be a challenge. View this webinar to hear from a leading consumer marketer and learn how to harness best practices that you can use in your day-to-day role. Fitbit’s Head of Lifecycle Marketing, Steven Marjon, will show you: - Tested best practices for communications - How to set up different communications tracks for onboarding new employees - Tools and resources to gauge the effectiveness of your communications
Tags : 
    
Fitbit
Published By: Bronto     Published Date: Sep 09, 2013
Like any relationship, the marketing lifecycle has unique phases with appropriate (and inappropriate) actions. Reading subscriber cues is important in getting this right. Learn about the elements of a strategic email marketing program that help move subscribers from introduction to a lifelong relationship.
Tags : 
lifelong subscribers, marketing lifecycle, strategic email marketing
    
Bronto
Published By: Marketo     Published Date: Apr 28, 2015
Download this ebook to see how to create your customer personas and customer journeys, define your goals for mobile marketing, and understand mobile marketing as an integral component of your comprehensive marketing strategy.
Tags : 
marketo, mobile strategy, mobile, email, marketing, channels, search marketing, email marketing, emerging marketing, social media, advertising agencies, internet marketing, crm & customer care, e-commerce
    
Marketo
Published By: ClearSlide     Published Date: Oct 24, 2013
To explore how effectively sales organizations are dealing with change, CSO Insights conducted a Sales Engagement Optimization (SEO) study, gathering input from 354 firms. Download now to see the results.
Tags : 
sales engagement platform, customer engagement, shorten sales cycles, sales enablement software, sales analytics, clearslide, customer management software, sales prospect tracking, customer engagement tools, optimize sales process, sales predictability tools, sales productivity tool, sales web tools, mobile apps for sales, online collaboration tool, how to deliver a good sales pitch, email pitch, presentation sharing software, improve sales forecasting, improve sales management
    
ClearSlide
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s businesses rely heavily on email to communicate with clients, partners, and colleagues. But research suggests that organizations are lacking when it comes to protecting themselves against the increasing number of customized and complex attacks. When polled by Mimecast, 83% of IT security managers said they see email as a primary source of attack, yet 65% claim they aren’t fully equipped to resolve the risks associated with email threats. Respondents’ perceptions of primary security threats also appeared to change based on having experienced a successful breach. However, viruses, malware, spam, and insider threats remain the top concerns for both groups, both with and without breach experience.
Tags : 
    
Microsoft Office 365
Published By: Mimecast     Published Date: Aug 22, 2017
Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry continue to cripple organizations. Business disruption, downtime, technical failure and data loss are all real risk factors that can’t be ignored. The power of preparedness is in your hands. Get expert insight, tips and guidance from industry thought leaders on how to build a cyber resilience plan for email in this e-book.
Tags : 
cyber resilience, petya, wannacry, cybersecurity
    
Mimecast
Published By: Proofpoint     Published Date: Dec 21, 2018
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses. Download this whitepaper today to find out the top tips on how to choose tools and solutions to improve behaviours and outcomes.
Tags : 
    
Proofpoint
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb, physical breach, virtual breach, malicious breach, sensitive information, malicious data leaks, threats, confidential information, data loss
    
Trend Micro, Inc.
Published By: ExactTarget     Published Date: May 03, 2013
Our data-driven digital marketing solutions will help you fuel the customer lifecycle, automate your operations, and improve ROI. Interested in learning more about what ExactTarget can do for you? Take a look at our suite of products.
Tags : 
digital marketing, email marketing, exacttarget, saas, email marketing solutions
    
ExactTarget
Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.
Tags : 
trendlabs, trend micro, data storage, small business, technology, security solution
    
Trend Micro Inc.
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : 
messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance, legal discovery
    
Symantec.cloud
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: Act-On     Published Date: Jan 20, 2012
Do you wish your email marketing system delivered just a bit more functionality? Are you spending lots of time managing multiple tools and correlating the data they provide? Would it be useful if your CRM and email were tightly integrated? Maybe it's time to consider a marketing automation solution. This new report from Gleanster Research will help you.
Tags : 
email marketing, marketing automation, marketing solutions, automation solutions
    
Act-On
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Websense     Published Date: Aug 23, 2012
"Is this email a phish or is it legitimate?" That's the question that employees - and executives in particular - are asking with greater frequency.
Tags : 
phishing, web security, email security, phishing attacks
    
Websense
Published By: Cisco EMEA     Published Date: Mar 08, 2019
When it comes to the threat landscape, it’s important to take a look in the rearview mirror once in a while. As with driving, not only do you get a good look at what’s behind you, but you can often spot what’s coming up quick, set to overtake you. That’s the spirit of this threat report. We’ve picked out five key stories from the last year or so, not just because they were big events, but because we think these threats, or similar ones, could very well appear in the near future. Take modular threats like Emotet and VPNFilter, for example. These are threats that can deliver an on-demand menu of attacks and threats, depending on which device is infected or the intended goal of the attacker. We saw plenty of such modular threats in recent history, and wouldn’t be surprised if we see more in the future. Email remains the darling delivery method of attackers, with threats from cryptomining to Emotet using it to spread. It’s also highly likely that other threats, such as unauthorized M
Tags : 
    
Cisco EMEA
Published By: Websense     Published Date: Jan 25, 2013
“Is this email a phish or is it legitimate?” That’s the question that employees — and executives in particular - read this white paper to learn guidance on how to recognize advanced threats and protect yourself from them.
Tags : 
phishing, targeted attacks, websense, security, scams, defence, key topics, security guidance
    
Websense
Published By: Bronto     Published Date: Sep 09, 2013
Are you constantly jumping from project to project with barely enough time to breathe? When continually pressed for time, how do you efficiently and effectively measure your email marketing programs? This concise and practical guide can help.
Tags : 
email marketing performance, strategic email marketing
    
Bronto
Published By: Oracle OMC     Published Date: Jul 16, 2018
In marketing, you’ve got to be able to pivot. Why? People are unpredictable. They delete emails you thought they’d open, ignore offers you thought they’d use, and add items to their carts before leaving them behind. Move faster and stay relevant with true multichannel fluidity.
Tags : 
customer, experience, email, multichannel
    
Oracle OMC
Published By: IBM     Published Date: Oct 24, 2012
If you met a valued customer face to face, you'd probably greet the person with a smile and a "hello." You'd want the communication and ongoing discussion to be personal and specific to the individual. Deliver -- Learn to connect with your users.
Tags : 
ibm, analytics, consumer behavior, consumer interaction, communication, email marketing, internet marketing
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: