How to fulfill a subpoena as a compliance officer
A nice blog post worth to read from Cheryl Ritchey.
3-2-1 Backup: The Rule For Recovery
A single backup is not enough You think you have a backup, so you are covered, right? Not even close. Having a backup of your emails is a must. However, it may not be enough. Several incidents show that some disaster could happen even if…
How to get rid of piler enterprise?
Reasons for a migration Why would you migrate from your current archiving product in the first place? There may be several reasons justifying the change: the currently used product may reached end of life (EOL), end of support (EOS) stage it lacks crucial features performance…
How to mitigate the risk of deleted emails in Outlook
Inside the Trash folder Message removal is an important feature of all email applications. It allows you to get rid of unwanted emails. Unwanted email is something you don’t want in your mailbox any longer for some reason. Unwanted is indeed a loose term. It…
Cyberhackers are Targeting your Organization’s Sensitive Data
Archive360 wrote an article about a security breach of Mimecast’s Saas platform claiming that “this unfortunate breach highlights the main security issues associated with third-party SaaS providers like Mimecast” The article’s solution is twofold: ask for your vendor’s or SaaS provider’s security model, and take…
How to prepare your inbox and home office for a fresh start in 2021
Carson Tate wrote a genius article about how to organize and take both your home and your inbox to the next level. He explains how to turn your email program to your personal assistant by prioritizing your emails using color codes, and tracking your pending…
Stop using SMS as part of Multi-factor Authentication (MFA)
In today’s security landscape passwords alone might not be sufficient to protect resources. One way to improve the authentication process is asking something else beyond the passwords. Many products as well as several banks offer multi-factor authentication (MFA) as a method to increase security. One…
Consolidating several anti-spam message headers on the SMTP gateway
A dedicated SMTP gateway is optional in front of the archive, however it may provide huge benefits using one. For example it may shield your archive’s smtp port from the outside world, or it may help you unify the various antispam message headers. Scenario You…
Running piler enterprise in a containerized environment with docker-compose
In the previous blog post we learned that the traefik edge router is a handy tool to provide https connection together with Let’s Encrypt. Wouldn’t it be nice if we could run all components required by an email archive including traefik as well in a…
How to obtain an A-grade Let’s Encrypt certificate with traefik
Nowadays a secure https connection is a must. I show you in this article how to obtain an A-grade https certificate with the traefik edge router for your archive. And the best part? Traefik automatically renews the certificate before it expires! To spare you from…
Latest insights
- 6 ways Piler outperforms Office 365 email archiving
- How an email archive can mitigate a ransomware attack
- Email archiving best practices
- Why You Need Email Integrity Check in Email Archiving
- Microsoft Caps Exchange Online’s “Unlimited Archive” at 1.5 TB
- Email backup vs. email archive
- Authenticate against Google Workspace (formerly gSuite)
- Escaping the PST chaos
- Software maintenance
- Using Azure AD single sign-on (SSO)