{"id":1678,"date":"2024-10-15T10:00:00","date_gmt":"2024-10-15T02:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=1678"},"modified":"2024-10-18T16:04:49","modified_gmt":"2024-10-18T08:04:49","slug":"reinforcing-webmail-security-with-sap","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/","title":{"rendered":"Reinforcing Webmail Security with Location-Based Access Control"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> &gt; <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> &gt; Reinforcing Webmail Security with Location-Based Access Control<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\">Reinforcing Webmail Security with Location-Based Access Control<\/h2><p class=\"eb-ah-subtitle\">October 15, 2024<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-1024x538.jpg\" alt=\"\" class=\"wp-image-1679\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the fast-paced landscape of modern business, where communication is the lifeblood of operations, safeguarding sensitive information exchanged via webmail is paramount. As businesses increasingly rely on email for critical correspondence, the specter of cyber threats looms large, posing significant challenges to data security and confidentiality. In this environment, the need for robust access control measures cannot be overstated. One such measures that Lookafter provides to our users is <strong>Suspicious Access Prevention (SAP) <\/strong>\u2013 a feature that controls access based on geographic location.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"root-eb-toc-rvwj6ms wp-block-essential-blocks-table-of-contents wp-block-essential-blocks-table-of-contents\"><div class=\"eb-parent-wrapper eb-parent-eb-toc-rvwj6ms \"><div class=\"eb-toc-container eb-toc-rvwj6ms  eb-toc-is-not-sticky eb-toc-collapsible eb-toc-initially-not-collapsed eb-toc-scrollToTop style-1 list-style-none\" data-scroll-top=\"false\" data-scroll-top-icon=\"fas fa-angle-up\" data-collapsible=\"true\" data-sticky-hide-mobile=\"false\" data-sticky=\"false\" data-scroll-target=\"scroll_to_toc\" data-copy-link=\"false\" data-editor-type=\"\" data-hide-desktop=\"false\" data-hide-tab=\"false\" data-hide-mobile=\"false\" data-itemCollapsed=\"false\" data-highlight-scroll=\"false\"><div class=\"eb-toc-header\"><h2 class=\"eb-toc-title\">Table of Contents<\/h2><\/div><div class=\"eb-toc-wrapper \" data-headers=\"[{&quot;level&quot;:2,&quot;content&quot;:&quot;Reinforcing Webmail Security with Location-Based Access Control&quot;,&quot;text&quot;:&quot;Reinforcing Webmail Security with Location-Based Access Control&quot;,&quot;link&quot;:&quot;reinforcing-webmail-security-with-location-based-access-control&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;The Essence of Suspicious Access Prevention (SAP)&quot;,&quot;text&quot;:&quot;The Essence of Suspicious Access Prevention (SAP)&quot;,&quot;link&quot;:&quot;the-essence-of-suspicious-access-prevention-sap&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;How SAP Enhanced Webmail Security&quot;,&quot;text&quot;:&quot;How SAP Enhanced Webmail Security&quot;,&quot;link&quot;:&quot;how-sap-enhanced-webmail-security&quot;},{&quot;level&quot;:2,&quot;content&quot;:&quot;How Do I Enable SAP?&quot;,&quot;text&quot;:&quot;How Do I Enable SAP?&quot;,&quot;link&quot;:&quot;how-do-i-enable-sap&quot;}]\" data-visible=\"[false,true,false,false,false,false]\" data-delete-headers=\"[{&quot;label&quot;:&quot;Reinforcing Webmail Security with Location-Based Access Control&quot;,&quot;value&quot;:&quot;reinforcing-webmail-security-with-location-based-access-control&quot;,&quot;isDelete&quot;:true},{&quot;label&quot;:&quot;The Essence of Suspicious Access Prevention (SAP)&quot;,&quot;value&quot;:&quot;the-essence-of-suspicious-access-prevention-sap&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;How SAP Enhanced Webmail Security&quot;,&quot;value&quot;:&quot;how-sap-enhanced-webmail-security&quot;,&quot;isDelete&quot;:false},{&quot;label&quot;:&quot;How Do I Enable SAP?&quot;,&quot;value&quot;:&quot;how-do-i-enable-sap&quot;,&quot;isDelete&quot;:false}]\" data-smooth=\"true\" data-top-offset=\"\"><div class=\"eb-toc__list-wrap\"><ul class='eb-toc__list'><li><a href=\"#the-essence-of-suspicious-access-prevention-sap\">The Essence of Suspicious Access Prevention (SAP)<\/a><li><a href=\"#how-sap-enhanced-webmail-security\">How SAP Enhanced Webmail Security<\/a><li><a href=\"#how-do-i-enable-sap\">How Do I Enable SAP?<\/a><\/ul><\/div><\/div><\/div><\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Essence of Suspicious Access Prevention (SAP)<\/h2>\n\n\n\n<p><a href=\"https:\/\/agnx.com\/helpdesk\/doku.php?id=faq:network_and_security:what_is_sap\" target=\"_blank\" rel=\"noreferrer noopener\">Suspicious Access Prevention (SAP)<\/a> is a security feature in <a href=\"https:\/\/lookafter.com\/login\" target=\"_blank\" rel=\"noreferrer noopener\">Lookafter Webmail<\/a> that leverages geolocation data to regulate access to webmail accounts based on the user&#8217;s country of origin. By implementing country whitelisting, SAP empowers account owners to define a list of approved countries from which access is permitted, while restricting access from all other locations.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How SAP Enhanced Webmail Security<\/h2>\n\n\n\n<p>At its core, SAP serves as a defence against unauthorized access attempts by hackers. By restricting access to webmail accounts based on both the user&#8217;s country of origin and the list of approved countries, SAP mitigates the risk of account compromise, even in the event of credential theft or phishing attacks.<\/p>\n\n\n\n<p>Imagine a scenario where a hacker manages to obtain login credentials through a <a href=\"https:\/\/lookafter.com\/blog\/email-security-tips-detecting-a-phishing-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> campaign targeting employees of a corporation. With traditional authentication method relying solely on username and password, the hacker would have unhindered access to webmail accounts, regardless of their location.<\/p>\n\n\n\n<p>However, with SAP enabled, the story takes a different turn. As the hacker attempts to access the compromised accounts from an unauthorized country, their access are blocked outright. Despite possessing valid login credentials, the hacker\u2019s attempts are obstructed, preventing any unauthorized entry into the webmail system.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">How Do I Enable SAP?<\/h2>\n\n\n\n<p>Enabling SAP for your webmail accounts is a straightforward process that typically involves accessing the Profile settings of webmail account. Here&#8217;s a general overview of how you can enable SAP:<\/p>\n\n\n\n<p>1. <a href=\"https:\/\/lookafter.com\/login\" target=\"_blank\" rel=\"noreferrer noopener\">Log in<\/a> to your webmail account, and navigate to Profile &gt; SAP.<\/p>\n\n\n\n<p>2. Select the \u201cEnable Suspicious Access Prevention\u201d checkbox.<\/p>\n\n\n\n<p>3. Choose and add the countries from which you authorize access to your webmail account in the given field.<\/p>\n\n\n\n<p>To access the full documentation for SAP, please see: <a href=\"https:\/\/agnx.com\/helpdesk\/doku.php?id=faq:network_and_security:what_is_sap\" target=\"_blank\" rel=\"noreferrer noopener\">About Suspicious Access Prevention (SAP)<\/a><\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Have questions? <a href=\"https:\/\/lookafter.com\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">Reach out to us<\/a> and get the answers you need!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.<\/p>\n","protected":false},"author":1,"featured_media":1679,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[17],"class_list":["post-1678","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Reinforcing Webmail Security with Location-Based Access Control<\/title>\n<meta name=\"description\" content=\"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reinforcing Webmail Security with Location-Based Access Control\" \/>\n<meta property=\"og:description\" content=\"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-15T02:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-18T08:04:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Reinforcing Webmail Security with Location-Based Access Control\",\"datePublished\":\"2024-10-15T02:00:00+00:00\",\"dateModified\":\"2024-10-18T08:04:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\"},\"wordCount\":418,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg\",\"keywords\":[\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\",\"url\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\",\"name\":\"Reinforcing Webmail Security with Location-Based Access Control\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg\",\"datePublished\":\"2024-10-15T02:00:00+00:00\",\"dateModified\":\"2024-10-18T08:04:49+00:00\",\"description\":\"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Suspicious Access Prevention (SAP)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Reinforcing Webmail Security with Location-Based Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Reinforcing Webmail Security with Location-Based Access Control","description":"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/","og_locale":"en_US","og_type":"article","og_title":"Reinforcing Webmail Security with Location-Based Access Control","og_description":"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.","og_url":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2024-10-15T02:00:00+00:00","article_modified_time":"2024-10-18T08:04:49+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Reinforcing Webmail Security with Location-Based Access Control","datePublished":"2024-10-15T02:00:00+00:00","dateModified":"2024-10-18T08:04:49+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/"},"wordCount":418,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg","keywords":["Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/","url":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/","name":"Reinforcing Webmail Security with Location-Based Access Control","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg","datePublished":"2024-10-15T02:00:00+00:00","dateModified":"2024-10-18T08:04:49+00:00","description":"Strengthening webmail security with location-based access control. Safeguard your accounts from unauthorized access attempts.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/08\/suspicious_access_prevention.jpg","width":1200,"height":630,"caption":"Suspicious Access Prevention (SAP)"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/reinforcing-webmail-security-with-sap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Reinforcing Webmail Security with Location-Based Access Control"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=1678"}],"version-history":[{"count":6,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions"}],"predecessor-version":[{"id":1809,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1678\/revisions\/1809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/1679"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=1678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=1678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=1678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}