These are the sources and citations used to research 9-1 Discussion: Email Security. This bibliography was generated on Cite This For Me on
In-text: (7 essential email security best practices - CyberTalk 2021, 2022)
Your Bibliography: CyberTalk. 2022. 7 essential email security best practices - CyberTalk 2021. [online] Available at: <https://www.cybertalk.org/2021/09/20/7-essential-email-security-best-practices/> [Accessed 6 March 2022].
In-text: (Duties, 2022)
Your Bibliography: Duties, C., 2022. Cybersecurity for Attorneys: Addressing the Legal and Ethical Duties | ABA Law Practice Today. [online] ABA Law Practice Today. Available at: <https://www.lawpracticetoday.org/article/cybersecurity-attorneys-legal-ethical/> [Accessed 3 March 2022].
In-text: (10 Email Security Risks And How to Tackle Them? [2022] - EES Corporation, 2022)
Your Bibliography: EES Corporation. 2022. 10 Email Security Risks And How to Tackle Them? [2022] - EES Corporation. [online] Available at: <https://www.eescorporation.com/email-security-risks-and-solutions/#1-_Spoofing_and_Phishing> [Accessed 3 March 2022].
In-text: (Harvey, 2022)
Your Bibliography: Harvey, S., 2022. 4 Common Types of Data Classification | KirkpatrickPrice. [online] KirkpatrickPrice Home. Available at: <https://kirkpatrickprice.com/blog/classifying-data/> [Accessed 5 March 2022].
In-text: (Policies on Electronics in a Workplace, 2022)
Your Bibliography: Work - Chron.com. 2022. Policies on Electronics in a Workplace. [online] Available at: <https://work.chron.com/policies-electronics-workplace-13027.html> [Accessed 3 March 2022].
10,587 students joined last month!