{"id":2512,"date":"2011-12-14T08:21:51","date_gmt":"2011-12-14T13:21:51","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=2512"},"modified":"2011-12-14T08:21:51","modified_gmt":"2011-12-14T13:21:51","slug":"5-tips-and-techniques-to-combat-spam","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2011\/12\/5-tips-and-techniques-to-combat-spam\/","title":{"rendered":"5 tips and techniques to combat spam"},"content":{"rendered":"

Many of us think of spam as an undesired consequence of being online, but due the relentless onslaught to which many of us are being subject, and the broad range of threats it can contain, we do have to be vigilant in how it is treated. This post offers five tips to combat spam.<\/em><\/p>\n

\"\"<\/a>Over the last few years, computer security has been steadily gaining prominence in the Caribbean. Many of us might attempt to implement measures to keep our information and computers safe online, but the threats are growing and getting more sophisticated. The focus therefore tends to be on viruses, Trojans, malware, etc., with relatively little attention given to spam. Security experts, such as Symantec<\/a> and Kaspersky<\/a>, currently indicate that spam accounts for at least<\/strong> 75% of all emails sent; and this figure is a substantial drop from as much as 90%, based on 2010 reports.<\/p>\n

While we generally think of spam as a bother \u2013 unsolicited email that just clutters up our email account, it is also getting more sophisticated and more pervasive. In addition to email spam, spam is also found in other media, such as blogs, search engines and mobile text messaging. Further, email spam increasingly contains either viruses or worms that will compromise your PC if installed, or web links to questionable websites, that can result in a raft of security problems.<\/p>\n

So what can you do to better protect yourself? Five suggestions are given below primarily for email spam.<\/p>\n

1.\u00a0 Install anti-spam email blockers and filters.<\/strong> To varying degrees most email applications offer some spam protection, via email blockers and filters. These facilities tend to place questionable messages in a \u201cjunk mail\u201d folder, where you, as the user, can review them. Normally, users must activate and configure those filters, which is a relatively simple process.<\/p>\n

It must be highlighted that most ISPs and email providers have implemented some form of anti-spam blocking for the benefit of their users, and to limit the amount of unwanted messages their servers have to handle. Hence some of the hassle of managing spam is often taken care of by the email provider.<\/p>\n

2.\u00a0 Take a closer look at the messages. <\/strong>Depending on the source of the spam, it might not automatically be sent to your junk mail folder. It might be from an email address you recognise or a sender that appears legitimate. In reviewing your messages, regardless of whether they are sent to your inbox or to junk mail, here are some things you can consider:<\/p>\n