Security Breaches in Healthcare: How To Protect Patient Data


Jay: A common one is clicking links in phishing emails. Jay: All users, even IT administrators, should only be granted the rights and permissions they need to perform their everyday tasks.

The Definitive Guide to Email Deliverability


The most commonly accepted definition of SPAM is Unsolicited Bulk Email or messages sent to a large number of people without any prior permission. If the recipient believes that email is unwanted and was sent without permissions then they can mark it as SPAM. Introduction.

Obey Facebook’s Rules of Engagement (Or Else)

Marketing Action

These standards touch upon subjects like violence, bullying, phishing, scamming, and harassment. Here’s a shortlist of guidelines: Obtain written permission before publishing content on someone’s behalf.

Rules 106

How do you sell SaaS software to enterprise businesses?


Fine-grained permission controls. While startups are small teams where everyone can be trusted with more access, the principle in big organisations is usually to limit everything to the barest minimum each employee needs, so that if credentials get lost or phished (which is a bigger risk in larger organisations, just due to scale), less harm can be done.

You're Pregnant! Just Kidding. Here's the News You Missed This Week.


There were some fears that the emails were a result of phishing attempts, but in the end, Amazon confirmed to TechCrunch that the emails were the result of a technical glitch, going on to send apology emails to the customers that received them.