Cisco IOS XE Software Web UI Privilege Escalation Vulnerability Wormable RPC Vulnerability ( Fixed ) Top Routinely Exploited Vulnerabilities Vulnerability vs Exploit vs Threat
...
  • Data storage is on RAID1 / RAID5, hence chances of data loss is extremely minimal.
  • The service is run out of highly available, secure data centers in Europe.
  • Continuous update of spam filters (with new patterns and train the filters with new spam mails) & white- & black-lists, apart from referring to several reputed blacklist databases. However, there are chances of false positives  & negatives.
  • Mails identified as spam will be delivered to the user’s spam folder; it is advisable for users to connect with the IMAP protocol so that this folder is visible. For those preferring the POP3 protocol, spam mail can be delivered to the Inbox, but the client should have a rule to put spam mail into the local spam folder using a header field which will have this information.
  • The service is not to be used for mass mailing for marketing purposes.
  • Systems/devices from where the mail service is to be accessed should be secured and all standard IT security practices should be in place. Users must also be briefed on good IT & email security practices.
  • Our DNS naming convention is to be followed for accessing the service. This is for security reasons.
  • Regular administration should be done using the email administration application provided for this purpose.
  • The service provider has limited expertise in email clients, esp. Outlook. While the service provider can help setup Outlook to access email services, service provider has seen issues like email sync errors, automatic creation of folders with weird names, and other such anomalous behaviour. These may have to be resolved by your desktop support team/agency. Similarly with other email clients, including those on Apple platforms.
  • All implementation and ongoing support will be remote only.