4 Ways to Protect Email Addresses on Websites, That Don’t Really Work
The Techbusy.org blog offers us 4 tips for hiding email addresses from spammers and hackers when displaying the address on a web page. The reason behind it is simple – spammers use spiders (much the...
View ArticleThe Weakest Link is Getting Weaker
The end user is the weakest link in the security chain, and as new generations enter the workforce the awareness of security risks decreases. A study by security researchers has found that only 14% of...
View ArticleThe Pros and Cons of 4 Ways for Handling Detected Spam
We talk a lot about the importance of detecting spam in business email, and the challenges in maintaining a high detection rate with low false positives. But we don’t often discuss the best way to...
View ArticleWho Gets to Decide if it’s Spam? Not you, Mr Marketer
There is a growing sentiment in some business circles that spam can be clearly defined by what is and isn’t allowed under the typical anti-spam legislation enacted by governments these days. In the US...
View ArticleHow to Prevent Postmaster Spam
When I meet a new customer to discuss their spam problems I often hear of the same complaint. “We are getting spam from postmaster addresses and we don’t know why.” This complaint has a multitude of...
View ArticleEmail Marketing and Protecting Online Reputation
On the internet a company’s reputation consists of two parts: What your customers (people) think of you What other systems (computers) think of you In an environment such as the internet where...
View ArticleExchange 2007 Spam Filter Overview
The Exchange 2007 spam filter is a built in feature of the Edge Transport server role, as well as an optional feature of the Hub Transport server role. The spam filter is made up of several individual...
View ArticleAnti-Spam is Not One Size Fits All
Anti-spam technology encompasses a lot of different practices, techniques, and systems for detecting and blocking spam emails. Customers sometimes look for a turnkey, push button, set and forget...
View ArticleShould You Use More Than One Anti-Spam Product?
A popular security term is “defence in depth”. It sounds really clever and evokes images of multiple layers of protection from a threat. An example of defence in depth would be a perimeter network...
View ArticleWill Businesses Need Spam Insurance One Day?
Could your business become financially liable for spam that comes from your network? It might sound far-fetched, but it could one day become reality. The Email Security Matters blog notes a German...
View ArticleWhy You Should Not Use a Catch All Email Address
A “catch all” email address is a mailbox that is configured to receive any emails that are sent to addresses that do not match a real, valid recipient. Catch all addresses are popular in a few...
View ArticleHow to Block Dangerous File Attachments with Exchange Server 2010
Ever since the first email viruses appeared the risk of file attachments in emails has been an important one for businesses to take seriously. To make it possible to manage this risk Exchange Server...
View ArticleConfiguring Exchange Server 2010 Anti-Spam Settings for Individual Mailboxes
When the Exchange Server 2010 anti-spam features are enabled and configured they take effect for all mailboxes within the organization. But sometimes it is necessary to customize the settings for...
View ArticleAvoiding IP Reputation Problems with Redundant Mail Paths
Some organizations wish to deploy complete end to end redundancy for their Exchange environment, including the outgoing routes to the internet. To achieve this most organizations will simply provision...
View ArticleUnderstanding the Spam Confidence Level in Exchange Server
If you have looked at Exchange Server’s anti-spam features or taken a peek at the headers of an email sent through an Exchange server you have probably encountered the term SCL before. SCL stands for...
View ArticlePreventing Internal Email Abuse with Exchange Server 2010
There is a lot of attention paid to preventing spam and other malicious email content from entering our networks. But there is a lesser amount of attention given to preventing internal abuse of email...
View ArticleAntivirus Protection for Exchange Server 2010
With all of the attention paid to spam prevention sometimes we forget that viruses and malware remain a strong threat to our business networks. Although in many cases spam and viruses go hand in hand,...
View ArticleKeep Spam Out of Exchange Server
I had an interesting discussion with some Exchange administrators a few days ago. Their solution to spam was to simply configure the Exchange anti-spam settings to send everything over a certain SCL...
View ArticleShould You Use More than One Blacklist to Prevent Spam?
Blacklists (or block lists) are a spam prevention technique that uses lists of IP addresses or domain names that are associated with spamming to determine whether to block or allow a particular email...
View Article5 Top Spam Myths that Still Haven’t Changed
I’ve been dealing with spam for a long time now, and even though we see changes every year in the major threats and new techniques that spammers come up with, one of the things that never seems to...
View Article
More Pages to Explore .....