{"id":2512,"date":"2011-12-14T08:21:51","date_gmt":"2011-12-14T13:21:51","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=2512"},"modified":"2011-12-14T08:21:51","modified_gmt":"2011-12-14T13:21:51","slug":"5-tips-and-techniques-to-combat-spam","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/12\/5-tips-and-techniques-to-combat-spam\/","title":{"rendered":"5 tips and techniques to combat spam"},"content":{"rendered":"
Many of us think of spam as an undesired consequence of being online, but due the relentless onslaught to which many of us are being subject, and the broad range of threats it can contain, we do have to be vigilant in how it is treated. This post offers five tips to combat spam.<\/em><\/p>\n <\/a>Over the last few years, computer security has been steadily gaining prominence in the Caribbean. Many of us might attempt to implement measures to keep our information and computers safe online, but the threats are growing and getting more sophisticated. The focus therefore tends to be on viruses, Trojans, malware, etc., with relatively little attention given to spam. Security experts, such as Symantec<\/a> and Kaspersky<\/a>, currently indicate that spam accounts for at least<\/strong> 75% of all emails sent; and this figure is a substantial drop from as much as 90%, based on 2010 reports.<\/p>\n While we generally think of spam as a bother \u2013 unsolicited email that just clutters up our email account, it is also getting more sophisticated and more pervasive. In addition to email spam, spam is also found in other media, such as blogs, search engines and mobile text messaging. Further, email spam increasingly contains either viruses or worms that will compromise your PC if installed, or web links to questionable websites, that can result in a raft of security problems.<\/p>\n So what can you do to better protect yourself? Five suggestions are given below primarily for email spam.<\/p>\n 1.\u00a0 Install anti-spam email blockers and filters.<\/strong> To varying degrees most email applications offer some spam protection, via email blockers and filters. These facilities tend to place questionable messages in a \u201cjunk mail\u201d folder, where you, as the user, can review them. Normally, users must activate and configure those filters, which is a relatively simple process.<\/p>\n It must be highlighted that most ISPs and email providers have implemented some form of anti-spam blocking for the benefit of their users, and to limit the amount of unwanted messages their servers have to handle. Hence some of the hassle of managing spam is often taken care of by the email provider.<\/p>\n 2.\u00a0 Take a closer look at the messages. <\/strong>Depending on the source of the spam, it might not automatically be sent to your junk mail folder. It might be from an email address you recognise or a sender that appears legitimate. In reviewing your messages, regardless of whether they are sent to your inbox or to junk mail, here are some things you can consider:<\/p>\n This list is by no means exhaustive, and by themselves do not automatically mean that an email is spam. However, should one or more of these points be present a healthy dose of scepticism is advised.<\/p>\n 3.\u00a0 Exercise care when sharing email addresses. <\/strong>Email harvesting has become rampant \u2013 from malware applications combing through your address book, to legitimate websites sharing customer information with third parties. Hence we could all benefit from exercising more discretion in deciding when to share our email address. For example, in emails that are being forwarded to a large number of recipients, addresses could be inserted in the \u201cbcc\u201d (blind carbon copy) field. Additionally, in social networks, such as Facebook<\/a>, Twitter<\/a> and LinkedIn<\/a>, you could opt to keep parts of your profile, such as your email address, private, but they can be viewable by those in your group or directly connected to you, if desired.<\/p>\n 4.\u00a0 Alter how you display your email address. <\/strong>Many of the programmes that are used to harvest emails from forums, websites, etc., are able to recognise an address by the \u201c@\u201d sign, and to varying degrees, the dot extension. One way of thwarting this, is to spell out the symbols used in an email address, which would not be understood by robots. Hence an email address normally written \u201cjohn.doe@test.yyy\u201d could be displayed as, \u201cjohn DOT doe (AT) test DOT yyy\u201d. Alternatively, your address could be written in a graphic, such as a jpeg or png file:<\/p>\n\n