If your vps is a firewall, you could use it as an exit point for different private networks: ip1 to mask the traffic for a guest subnet that you don’t trust and if the ip gets blacklisted there are no issues for lan traffic behind ip2 while ip3 is reserved for server traffic with specific rulesets on supplier’s systems for updates/backup/whatnot.
Should you have more than one mail server because of reasons, if one is blacklisted the other could remain clean (in this situation you usually put them on different subnets but whatever).
You need a mail server somewhere, a mail client cannot listen for incoming messages.
A possible workaround: you could activate your own mail server accessible only inside tailscale and use it to send and receive your local alerts.
A quando una formazione adeguata per gli utenti?
Nell’articolo si fa riferimento alle aziende private costrette a pagare: un ransomware entra spesso tramite ingegneria sociale, falle nel ‘sistema umano’.
Ma la formazione costa; meglio spingere per una soluzione (che non funziona) pagata da qualcun altro.
If your vps is a firewall, you could use it as an exit point for different private networks: ip1 to mask the traffic for a guest subnet that you don’t trust and if the ip gets blacklisted there are no issues for lan traffic behind ip2 while ip3 is reserved for server traffic with specific rulesets on supplier’s systems for updates/backup/whatnot. Should you have more than one mail server because of reasons, if one is blacklisted the other could remain clean (in this situation you usually put them on different subnets but whatever).