Internet Message Access Protocol (IMAP)

20th February 2020 | Cybrary Internet Message Access Protocol (IMAP)


Internet Message Access Protocol (IMAP) is a standard email protocol, first widely deployed in the 1980s, that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user’s computing device.  This can help employees at a business to organize messages into specific folders, let clients know which email have been read, flagged for urgency, or follow-up and save draft messages on the server.

Source: TechTarget

Additional Reading:  Where does IMAP Security Fall Short?

What should an SMB Owner do with IMAP?

Many businesses have left IMAP for webmail services such as GSuite and O365 because they generally are far more secure than IMAP.  They provide encrypted access, two-factor authentication, and robust services that have far exceeded the capabilities of IMAP.  If your business is still relying on IMAP, get off of it today!

To learn more about IMAP, watch this short 3 minute video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more