Internet Message Access Protocol (IMAP)

20th February 2020 | Cybrary Internet Message Access Protocol (IMAP)


Internet Message Access Protocol (IMAP) is a standard email protocol, first widely deployed in the 1980s, that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user’s computing device.  This can help employees at a business to organize messages into specific folders, let clients know which email have been read, flagged for urgency, or follow-up and save draft messages on the server.

Source: TechTarget

Additional Reading:  Where does IMAP Security Fall Short?

What should an SMB Owner do with IMAP?

Many businesses have left IMAP for webmail services such as GSuite and O365 because they generally are far more secure than IMAP.  They provide encrypted access, two-factor authentication, and robust services that have far exceeded the capabilities of IMAP.  If your business is still relying on IMAP, get off of it today!

To learn more about IMAP, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more