O'Reilly logo

Office 2016 In Depth by Joe Habraken

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

27. Securing and Maintaining Outlook

Outlook’s capabilities for communication are based on the fact that Outlook is connected to a data network. Whereas some Outlook users take advantage of Outlook’s features in controlled and secure corporate network environments, many of us use Outlook as a tool for communicating over the Internet. This potentially opens our computers to outside attack by viruses and other malware. Even the most secure network environments fail to completely protect Outlook users from malicious email file attachments and junk email.

In this chapter, we take a look at some of the ways to secure Outlook. This chapter also discusses some of the maintenance tools you can use to keep your Outlook environment more organized, such ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required