Logo_R2-01.png

Guardian Forest Security Limited

Your Personal Security Consultant

  • Home

  • About

  • Service

  • Principle

  • Contact

  • Blog

  • Logical Security

  • More

    Use tab to navigate through the menu items.

    Security Blog

    Our Recent Posts

    Smishing Tactics - Delivery, Unpaid fee, Resolve it

    Smishing Tactics - Delivery, Unpaid fee, Resolve it

    Gathering Quantitative Data in Mainland China

    Gathering Quantitative Data in Mainland China

    Phishing Tactics - Attorney, Deceased, Unclaimed Assets

    Phishing Tactics - Attorney, Deceased, Unclaimed Assets

    Archive

    • May 2022
    • April 2022
    • December 2021
    • July 2021
    • April 2021
    • November 2020
    • July 2020
    • October 2019
    • July 2019
    • May 2019
    • January 2019
    • December 2018
    • October 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017

    Tags

    • access card
    • access control
    • assa abloy
    • battery
    • biometric
    • burglary
    • camera
    • car
    • CCTV
    • china
    • CLIQGo
    • cloud
    • cost
    • cyber security
    • dedicated data line
    • Email
    • false alarm
    • fingerprint
    • hack
    • housekeeping
    • human
    • Information
    • infra-red
    • Intellectual Property
    • Investigation
    • iPhone
    • keypad
    • legal
    • lock
    • logical security
    • network layer
    • operation
    • parking
    • phishing
    • phone line
    • police
    • policy
    • politics
    • QR Code
    • remote access
    • risk analysis
    • risk assessment
    • safe
    • sensor
    • video
    • wired
    • wireless
    How to encrypt my email?

    How to encrypt my email?

    Risk Electronic mail (email) is a significant part of our daily communications. Some of us may wonder if our email (information asset in digital format) are abused by others with malicious intentions. Large Company For larger corporations, in-house information technology (IT) department may have your email security covered. This is usually done by endpoint protection installed at your workstation and transmission encryption completed at the email client software level. Small

      © Guardian Forest Security Limited
      Your Personal Security Consultant
      Est. 2017 Hong Kong