Protect Yourself From Spam and Spyware for Newbies

Published on December 2016 | Categories: Documents | Downloads: 27 | Comments: 0 | Views: 215
of 71
Download PDF   Embed   Report

Comments

Content

Protect yourself from spam and spyware
for Newbies

Table of Contents
PROLOGUE ........................................ 6  CHAPTER ONE - THE BARE BASICS .... 7 
WHAT IS SPAM? .......................................... 7  WHAT IS SPYWARE? ..................................... 8 

CHAPTER TWO - ESTABLISHING A CONNECTION .................................. 10 
DETERMINE THE NEED .................................. 10  PUTTING YOUR EMPLOYEES IN THE KNOW ........... 12  EXECUTION ............................................... 13  FREQUENT SAFEGUARDS ............................... 14  EVALUATION.............................................. 16 

CHAPTER THREE - MAPPING ........... 18 
MORE ABOUT CHOICE ................................... 18 
ActiveX and Java ...........................................19  Browsers and Registry.................................... 19  Cookies ........................................................19  Beginners and Students.................................. 20  A Few Key Employees ....................................20  Get your employees to commit ........................ 20 

SETTING THE STAGE .................................... 21 

CHAPTER FOUR – BE IN THE KNOW 23 
KNOW THE ENEMIES .................................... 23  KNOW YOUR FRIENDS .................................. 24 
2|Page

FINE TUNING............................................. 26  COMPARING AND PRICING OF SPAM BLOCKING SOFTWARE ............................................... 28 
Research ......................................................28  Price ............................................................28  Support and Upgrades.................................... 29  Training .......................................................29  References ...................................................29 

COMPARING AND PRICING OF SPYWARE BLOCKING SOFTWARE ............................................... 30 
Research ......................................................30  Price ............................................................30  Support and Upgrades.................................... 31  Training .......................................................31  References ...................................................31 

CHAPTER FIVE - RELATING TO OTHERS .......................................... 33 
FORGETTING THE SAFEGUARDS ........................ 33  CHECK POINTS .......................................... 33  GET RID OF THE SLUDGE CHECKLIST ................. 35 

CHAPTER SIX - MORE GUARDS AND OPTIONS FOR SPAM ....................... 36 
ASP OR APPLICATION SERVICE PROVIDER ........... 36 
Spam and Blocking Programs ..........................37  External Hardware .........................................38  Preset Spam Blocking Program ........................ 39 

CHAPTER SEVEN – MORE GUARDS AND OPTIONS FOR SPYWARE ................................................. 40 
3|Page

ASP OR APPLICATION SERVICE PROVIDER ........... 40  SPYWARE BLOCKING PROGRAMS ...................... 41  EXTERNAL HARDWARE .................................. 42  SPYWARE BLOCKING PROGRAMS ...................... 43 

CHAPTER EIGHT – SOLVING DIFFERENCES ................................. 45 
SPECIFIC EMPLOYEE TRAINING & HARMONY ......... 45  GROUP AND INDIVIDUAL TRAINING ................... 46 
Preparation: .................................................46  Delivery: ...................................................... 46  Practice:.......................................................47  General Points to Ponder: ...............................47  Handbooks: .................................................. 48 

AFTER TRAINING - GETTING READY TO DRIVE ...... 49  PEOPLE HELPING PEOPLE ............................... 51 

CHAPTER NINE - MAPPING SAMPLES ....................................................... 54 
TEST THE SPAM .......................................... 54  ORGANIZE THE TEST DATA ............................. 55  MAKING USE OF THE EVALUATION .................... 56  SPAM TESTING FOR REAL .............................. 57  SPIES AMONG US........................................ 59  ORGANIZE THE TEST DATA ............................. 60  MAKING USE OF THE EVALUATION .................... 61  SPY HUNT ................................................ 63 

CHAPTER TEN – TECHNICAL REALM 65 
4|Page

DAY TO DAY STUFF...................................... 65 

CONCLUSION .................................. 68 
REVIEW OF SYSTEMS ................................... 68 

5|Page

Prologue
Today’s world is full of scams and con-artists. Now, the schemes flow vastly and freely in cyberspace. Spam and Spyware can and will, if left unattended, clog up your company’s computer network. A company wouldn’t even think twice about running their computer system without virus protection. Protection against these other threats is equally as important and necessary. In short, inadequate programs will leave your business without protection. The purpose of this book is to help steer the business owner in the right direction. Choosing the proper program can be difficult without the proper information. Many factors will play a part when deciding on the program for your business. This book will break down some of the more difficult and technical components into day to day language to help you understand more about spam and spyware, which are in a way the same, but in a way, very much different.

6|Page

Chapter One - The Bare Basics
A good starting place would be basic information about Spam and Spyware. Understanding a problem goes a long way in finding a solution. The company owner must select the program, install the program, and then train the employees in the proper use of the program. You could have the best programs in the world but without proper installation and use, the program would be useless. This would be like filling up the swimming pool and not plugging the drain. You get absolutely nowhere.

What is Spam?
Spam is like a close relative to junk mail. Junk mail is just that, JUNK. Spam is the bad apple ready to spoil the entire batch. Spam tries to lure you to a particular site and tries to sell you something. Spam uses clever methods to swindle money from even the smartest. While spam is working its black magic on your company’s computers, malicious viruses and Trojan worms are sneaking in the door. Seemingly innocent and appropriate spam entices the user to open and read the email. Subject lines often give no clue. Spam is the ultimate in cons -- it is a liar and a cheat and very hard to detect. Employees have to sort through all the email and weed the good from the bad. Emails are accidentally deleted that should have been saved. The mailbox becomes full and important email is lost. Spam is frequently filled with pornography that usually has a computer virus embedded within the body of the mail. The company loses valuable time. Spam can be filtered through the company and passed to other companies and
7|Page

individuals. This action can cause a law suit against your company. A large amount of time can be spent trying to repair damage. A large amount of money can be spent paying for the repairs. An entire network can potentially be shut down. The productivity of the entire company would be affected causing a loss of revenue.

What is Spyware?
On the other hand of spam, spyware is like a sleazy, sneaky Cat Burglar. It watches potential victims. It sneaks in and steals valuable information from your company. When a site is visited, a fingerprint is left. This fingerprint can trace directly to the computer system that accessed the program in the beginning. Spyware looks into the inner most workings of a computer. It goes behind the dead-bolt and surveys the room. Sensitive company information can be exposed. This information can be used to steal your assets. Besides the deliberate stealing of revenue, company information can be used in other harmful ways. The company’s information can be used to scam others or set up a bogus store front. Identity theft can be a huge nuisance and can definitely be something that could arise in this case. Another potential problem from spyware can be the loss of company secrets. Tracking your every move -- just waiting and looking for company information. Key loggers track information typed or where the mouse is clicked to obtain passwords and user ID. Most companies desire to hide the delicate information that make the foundation function and prosper. Spyware can be as dangerous to that foundation as a virus can be.

8|Page

Legal protection is available. Internet Service Providers are eager to catch and prosecute the offenders. Local, State, and Federal agencies have special task forces to do their own tracking for these felons.

9|Page

Chapter Two - Establishing a Connection
Determine the Need
Determining the need may seem a bit redundant. The need is obviously for Spam and Spyware blockers. The actual choosing of the proper program will be more involved. Begin with the following considerations: How many employees are in the company? How many computer terminals are utilized? Are the employees in one proximity? Are the employees spread around the country? Which terminals receive emails? Which terminals send emails? How much Spam does the company receive? How much Spyware does the company receive? Does every employee receive and send email? Are computers linked or are they separate? The size of the company and number of terminals will
10 | P a g e

have the biggest impact in the selection of a blocking program. Terminals in one location and linked usually require one program with a fee for multiple users. Terminals in different locations but are linked usually require more than one program with a fee for multiple users. Multiple stand alone systems usually require a program for each terminal. The volume of email sent and received will determine the type of program. It goes without saying that the higher the volume, the higher the risk. The program will have to be set so the offensive is filtered out while allowing important emails to arrive in the mailbox. Most Internet Service Providers (ISPs) have Spam and Spyware programs included with their service. These programs will have to be set also. It is still recommended that a blocking program be purchased in addition to that of the Internet Service Providers. The available space on the hard drive will be affected as Spam is filtered and offenders are sent to the quarantine vault. Just how savvy are the employee’s computer skills? Some of the blocking programs are complicated and require advanced user installation. How many will you have to train at a sitting? Training will be vital to the usage of the program unless you want the terminals frozen. Consider the difficulty of the entire training process and the length of time required to train. Support is another consideration to ponder. Not all programs offer technical support with their blocking system. This could be an additional cost. However, you should keep in mind that support is vital. Regardless of how simple a program is to use, something will go sour and
11 | P a g e

technical support will be required. Getting the support of the employees will be necessary. Unwilling staff will make utilization of the program difficult and not run smoothly. Some questions to consider: Do updates come with the program? Are they included in the cost or additional? Each one of these factors will determine the right blocking system the company will require. Make a list and then start window shopping. If a program offers a trial, consider using it on one or two of your terminals in various locations. If they don’t offer a trial, ask for one and see if one is available. Be sure they know you are comparison shopping as this may make one available even if it wasn’t to begin with.

Putting Your Employees In The Know
Employees should be consulted about the types of Spam and Spyware they receive. Things to consider: How much of each do they receive on a daily basis? Are they plagued by pop-ups or mainly emails? How likely are your employees to be lured to a site? Keep in mind, these spammers and sneaks are very clever. They can even make the email seem as if it originated within the company. They can change the address
12 | P a g e

and make it look like you are at an official site in which the company does business. Prepare employees for the installation of the blocking software. When installing software for a large network or many different terminals, coordination will be advised. You will want to set a time so preparation at the work station is done. Meaning, backups made, important work and emails or other data is properly saved. Prepare installation for a time when there is less overall usage or at night when employees are away. Staggering the installation might be necessary.

Execution
Just how does the software program protect a system from invasion? The program is either installed using a disk provided or it is downloaded. Once installed, registration is required. Most software programs will send a key to unlock the program for use. Acceptable addresses are placed in the filter. Unacceptable addresses and key words or phrases are placed in the filter. Alerts and notifications of unsafe locations are placed into the filter. Once this is complete, run the program. Observe the scanning and be sure everything is working properly and set
13 | P a g e

to the proper specifications for your needs. After this, regular scans for Spyware, Spam, and tracking cookies should run. Any offenders will be placed either in a spam folder, in quarantine, healed, or deleted. This will depend on the settings you specified during installation. Emails placed in the spam folder can be viewed to ensure an acceptable email was not sent to this folder. In the early stages of the program, this would be advisable.

Frequent Safeguards
Regular maintenance is necessary to keep each terminal running smoothly for both the business and the blocking software. In order to maintain harmony, certain safeguards need to be set up and followed. Check the vaults. Clear frequently to avoid sluggish performance. Valuable disk space is used with the quarantine vault. Review and update the acceptable emails and sites. This is referred to as a “white list” - Meaning the good guys. As more and more spammers and spyware are introduced, the program has to be informed to prevent the good guys getting placed in the wrong area or deleted. As the blocking software works, the unacceptable emails and sites will also be working. These undesirables are frequently referred to as a “black list”. This will require restructuring of the software to capture the bad guys. Settings will need to be changed, informed, and updated. To keep the blocking software program working for your
14 | P a g e

company, regular updating of the program will be required. Just as the user has to adjust the settings regularly, the software program has to be kept current. New schemes and threats are developed each and every day. As these become apparent, the parent to the blocking software works to add to the program specific to these threats. Also, changes in the internet programs, operating systems or email service will require bringing the software current. Think of updates as reinforcements for the working army. Set a regular schedule for these operations and see they are followed. In the early stages of the program, it would be in the best interest of the company to set a more frequent maintenance operation. As the users become more familiar with the software and settings seem adequate for your needs, then it would probably be safe to lengthen the time for the schedule. Consider automatic updates and downloads for the blocking software. This would prevent a delay in major updates that could be serious threats to the computers. It would also be a good idea to have specified persons within the company to oversee these maintenance operations. This should be someone familiar and computer knowledgeable. Make sure the network computers are getting the updates and performing the maintenance required. Make sure each network is getting use of the entire system including alerts, automatic updates/scheduled updates. This would be especially important for the terminals not close and independent computer systems. Just like regular maintenance for your car such as regular oil changes are needed to keep the automobile running smoothly. Regular computer and software
15 | P a g e

updates are required. Remember, nothing is going to work for your company if it’s not used. Programs without updates will soon begin to look like a piece of Swiss cheese that is full of holes. It’s a little like homework. Homework that is complete and kept up helps school go smoother. Homework that is not completely done or not done makes it hard at school. You’re not armed with enough knowledge to pass the test. A blocking software program not checked daily and not updated is not going to make the grade and give the company the protection it needs.

Evaluation
Ok, homework is done and now comes the most important aspect. Which blocking program should be purchased? It’s time to sit back and take stock. Here is a checklist to work with: Evaluation of the company’s computer network has been completed. There is an accurate count and location of each that uses the internet and gives and receives email. Employees have been evaluated to determine the nuisance from Spam and how often they are mistakenly taken to an undesirable site. Consideration for the employees knowledge to use the program is noted. Training schedules have been established.
16 | P a g e

A comparison between different programs has been completed. The comparison includes the cost, support, upgrades and training of the employees. Computer system has been evaluated to the size. Computer system has been evaluated for system requirements. Now, a choice can be made. After the choice is made and the software is installed, you should do the following: Take note of the working aspects of the software. Look at the settings and check for accuracy and need. Make sure the company’s computer network is operating without difficulty. Make sure access is still available to frequently used web sites, company home page, and email. Train and learn the software program. In the next chapters, more detail will be discussed regarding the specifics of Spam and Spyware.

17 | P a g e

Chapter Three - Mapping
Remember the definition of spyware? Spyware is a method to get information about your company without your permission and without your knowledge. It will follow the paths of the user and send it to the originator of this predator. Spyware also records the user’s key strokes in order to configure passwords, account information, and company’s vital information. Because Spyware can obtain such valuable information and sensitive information, this chapter will map out specifics to choosing a Spyware Blocking program.

More about Choice
Every company and every personal computer user tries to access only the “trusted site” zone, email from and to known associates and so on. Regardless of how careful the user is, there’s always a point of entry to access. Consider the news in just the past few years. There have been reports of programs requiring a patch after discovery of a Trojan worm or virus. There have been reports where one individual was responsible for mass spamming and use of spyware to steal millions. These are simply just warnings of emails and software downloads that have been spam or some type of spyware; yet, we still seem to not take action at the most critical times. We cannot be expected to do this alone nor should we try. Spyware blocking software examines critical areas and programs on the computer system.

18 | P a g e

ActiveX and Java
These are two programs used in every operating system using the internet. This is an area where spyware frequently gains access to the system and tries to hide its presence.

Browsers and Registry
Spyware programs gain access by attaching itself to each. This allows total freedom for attacking the home page, and anywhere the user travels using the internet.

Cookies
Cookies are used to track your use. While there can be advantages, this is the ultimate in spying on the users every move. Every move the user makes will get a cookie. Spyware blocking programs scan these important aspects of the computer and any other or all files in the system. Then the program will remove, heal, or “jail” the offenders. This includes fixing registry items or changes to programs. Many of the same considerations are necessary when choosing Spyware removal programs as in anti-spam programs. One major difference would be the gateways to the company’s sensitive information. A functional and useful spyware blocking program must take care of these offending methods to the company computer system. Let’s take a quick look at what you should look for: The system should have an alert system.
19 | P a g e

The removal software should have ability to scan different settings one being the entire computer network and another for particular files, programs, etc. Support should be included. Again this may be included or have to be purchased separately. Most important, Updates, Updates, and more Updates with a notice when new updates become available.

Beginners and Students
Preparing employees to utilize the program will be important for proper function of the program. Set up a thorough instruction to the workings from beginning to end. Include in this instruction how to manage and look for updates. Include how and when to seek support.

A Few Key Employees
Consider selecting a few employees who oversee the Spyware blocking program. These workers can help keep the other users up to date and train new users. It is a big help to have a few select people to manage updates, scans, vaults and support. The fewer people managing the program though, the fewer mistakes there will be with the use of the program.

Get your employees to commit
Spyware to the company computer network is like a spy in the government. Both strive to get secrets and
20 | P a g e

valuable information. Both take this information and use it in ways that can cause serious, unrecoverable assets and operations. Therefore, it’s important to ensure that your employees are aware of all the proper procedures and policies so that everything will run smoothly; otherwise, if your employees do not commit themselves to this – it could drastically fail.

Setting the Stage
After installing the program, immediately run a scan. The program will give an option for the initial scan. Choose Yes. You will be surprised at how much Spyware is contained in the company’s computer network. Test this again by signing on to the internet and browsing for 5 to 10 minutes. Then run the removal program again. Again, you’ll be surprised by the amount of Spyware offenders in your system. Some helpful tips: Use the tutorial program for operation of the program. Follow the guidelines for settings and security. Make sure the internet programs and emails work properly. This might sound funny but check for updates. Programs that are on disk or downloaded are of specific format and content. Updates and changes to the program may have come out since the development of the original program.
21 | P a g e

So, let’s do this: Develop a regular scan system. This is best done during down times or periods of slow use. Don’t have the internet open when you scan. Also, scan at other various times between the scheduled scans. Scan when programs become sluggish or frequent error alerts appear. KEY NOTE: Don’t be shy about running scans for Spyware. This feature can’t be over used. Spyware blocking programs can save the company valuable time, loss of revenue, and from the loss of sensitive information. Proper training, use, and maintenance of these programs are absolutely essential for proper protection.

22 | P a g e

Chapter Four – Be in the Know
Know the Enemies
When trying to rid the company’s computer network of spam and spyware, it helps to know how the threats work. Numerous methods are used to gain entry to the computer. Unfortunately, newer ideas will come up from these predators on a daily basis and we simply cannot keep up. The most well-known vehicle for spam is email. The Spammers will buy email in mass. The sellers of the addresses come from various methods. Web sites that require a user to register most often sell email addresses. Some web sites just require the user to enter their email address or the address and a password. The user can bet the email address will be sold. Regardless of the promises, the email address is sold. Email addresses are practically free for picking at certain sites. Web based support groups, chat rooms, and even fan clubs are open to any user. The spammer simply opens the site and has access to masses of email addresses. Requesting the email address be removed results in this request to be sent to many. Information from the different groups, survey responses or some type of specific data retrieved from these sites is vital and necessary for the business and because this happens, the company network is vulnerable. Directory attacks are really fairly easy for the spammer. The average user doesn’t even know that the directory is open and so friendly. This happens through the internet in which the email is received. The company should check to see if VRFY is supported
23 | P a g e

and turned on. This method of attack can result in mass spam emails to every computer the company has in use. Spammers are getting cleverer at by-passing the spam filter settings each and every day. This is achieved in numerous inventive ways. The villains will send out emails that look absolutely real. The illegal use of various company names as the sender is used. Mass emails are sent with the same content but different content in the subject line. Another method used is to deliberately type in extra letters, numbers, or characters within the words in the subject area. Since the filter can’t read the key words that indicate spam the email is allowed into the in box. Blocking these addresses is difficult since they constantly change both from the origin and the arrival of the email. But, why all the effort to get the spam to you? Simple Money. If a hundred emails are sent and they get one response, they get money. They make money from the sale of addresses. Spamming is big business. Illegal, but big.

Know Your Friends
Spam filters work to keep predators away. They need to be told what to do and who to do it to. How can you help? Let’s take a look at a quick list of
24 | P a g e

things that you can do in order to help your spam filters work properly and keep the awful predators away from your company’s computer and computer system. Customize the keyword list frequently. Add the address from spammers even though it will probably change. Set the filter to recognize emails offering something to sell. The filter can recognize part of the name Check frequently for patches. This can be done best by going to the home page of the operating system used. Spammers work hard to get to you. The operating systems work hard to keep them away. Patches cover the means in which the spam entered. An operating system also tries to upgrade its program to be more sophisticated in order to outsmart the offenders. What are some other ways you can help? Watch for notices and alerts of patches available. Keep the company’s spam filter updated frequently. Run the scans. Don’t just rely on the preset days and times to scan. When entering sites that require the email address and/or other information, change the password often. Change the password to the company’s computer system often.

25 | P a g e

Don’t let these changes be predictable, if at all possible. Re-work the password at odd and various times. Never set a specific day and time to reset passwords. Learn to recognize spam; don’t rely on the program alone. Train the employees in techniques used by spammers. Train the staff to recognize suspect subject lines and bogus content from addresses.

Fine Tuning
Begin with the capabilities of the company’s computer network. What is the size of the system? Does the company plan to increase or add to the system? How much work will be required of the computer? The answers begin with the size of the company, the volume of internet and email use and the size of the computer. Get the configuration of the bandwidth. This will be a determining factor with the spam blocking software. If email volume and internet usage is high on an average day, the spam filter must have the capacity to operate the large load. Consider the foundation of the network and the path it takes to your network.
26 | P a g e

The email begins with the internet server’s email system, passes through the spam filter. If the spam filter deems this clean the email is forwarded to your company’s computer network. While keeping this in mind, realistically determine the volume for the filter. Staff will send and receive emails from clients and customers. The addresses of each contact should be placed in the contacts allowed in the browser setting, in the spam filter and in the address book. Failure to add a client to this list could result in the correspondence being sent to the spam folder. Take into consideration the type of business the company deals with. The filter will need to recognize the keywords pertaining to the company business. Keywords will need to apply to both incoming and outgoing. Set limitations for personal computer use of the company’s system. Blacklist certain sites such as: Game sites or Chat rooms Limit browsing at random for items such as gifts or cars. Allow only a certain amount of time for personal use. Prohibit the receiving and sending of jokes, and mass forward emails. Let the staff open these on their personal computer. Set a standard for company email sent to clients. Make sure each staff member is informed and willing to
27 | P a g e

follow these guidelines. The company wants the email sent to their clients, not a spam folder, and they want it to not be available to spammers. Request your clients follow similar guidelines for the same reasons. This move will make for safer exchanges. Strive for precise wording in the subject line. This will help avoid different interpretations of the subject line.

Comparing and Pricing of Spam Blocking Software
Let’s look at the maker and owners of the spam blocking software. Prepare a list of questions tailored to the company’s needs. Ask for specifics and request they explain their response.

Research
Determine the features, size, and computer requirements. Can the program be tailored to the company’s needs? Will the software be capable to run properly according to the company’s email volume?

Price
Ask exactly what is included with the quoted price. Inquire specifically about upgrades and support. Let the seller know the company is comparison shopping. Most will be willing to negotiate a price when the deal is of a sizeable nature. Discuss cost of multiple stand alone personal computers and network computers. Find out if there is a trial program and what guarantees are offered.
28 | P a g e

Support and Upgrades
Inquire about internal testing of the program. If the support is to be purchased separately, find out if the coverage purchased includes the entire program. Determine if the support agreement needs to be renewed yearly or if the agreement is for life of ownership.

Training
Inquire about onsite training. Be sure to ask if there is a limit to a class and the number of classes. If no onsite training available, ask if phone or instant messaging training assistance available. Consider sending the group that will oversee the software operation to the manufacturer site if available. Request written manuals, help and tutorial in the program.

References
Ask for a list of references and actually follow up with the list. Prepare in advance a few very key questions regarding the performance, support, and upgrades of the software. Don’t hesitate to request specifics about the manufacturer. Ask how long they have been in business and how long the software has been in the works. Is the manufacturer large with a large client base? Are they listed with the Better Business Bureau? Perform a search about the software company. Look for alerts or grievances that might be placed on the FTC website.
29 | P a g e

Do they list the company’s main personnel? How many employees are available? The company needs to be assured the software company is large enough to handle your business.

Comparing and Pricing of Spyware Blocking Software
This section is very similar to that of spam blocking software; however, for re-enforcement and an easy list to run down, the instructions will be repeated in a manner of speaking. Let’s look at the maker and owners of the spyware blocking software. Just like with the spam blocking software, you should properly prepare a list of questions modified to the meet company’s needs. Ask for details and demand they explain their response. This will allow you to know whether or not they know what they are doing and what they are talking about – you’ll feel much safer by doing this.

Research
Determine the features, size, and computer requirements. Can the program be tailored to the company’s needs. Will the software be capable to run properly according to the company’s email volume?

Price
Ask exactly what is included with the quoted price. Inquire specifically about upgrades and support. Let the seller know
30 | P a g e

the company is comparison shopping. Most will be willing to negotiate a price when the deal is of a sizeable nature. Discuss cost of multiple stand alone personal computers and network computers. Find out if there is a trial program and what guarantees are offered.

Support and Upgrades
Inquire about internal testing of the program. If the support is to be purchased separately, find out if the coverage purchased includes the entire program. Determine if the support agreement needs to be renewed yearly or if the agreement is for life of ownership.

Training
Inquire about onsite training. Be sure to ask if there is a limit to a class and the number of classes. If no onsite training available, ask if phone or instant messaging training assistance available. Consider sending the group that will oversee the software operation to the manufacturer site if available. Request written manuals, help and tutorial in the program.

References
Ask for a list of references and actually follow up with the list. Prepare in advance a few very key questions regarding the performance, support, and upgrades of the software. Don’t hesitate to request specifics about the manufacturer. Ask how long they have been in business and how long the software has been in the works. Is the manufacturer large
31 | P a g e

with a large client base. Are they listed with the Better Business Bureau. Perform a search about the software company. Look for alerts or grievances that might be placed on the FTC website. Do they list the company’s main personnel? How many employees are available. The company needs to be assured the software company is large enough to handle your business.

32 | P a g e

Chapter Five - Relating To Others
This section details management and delegation of duties.

Forgetting the Safeguards
Now that the anti-Spyware and/or Spam software is installed, it’s time to perform the checks to assure the program is running properly to the computer networks specifications. Check every individual terminal. Issue new user accounts, passwords, and separate email accounts. Remember the maintenance. Installing a Spam filter is an excellent step; however, that’s not the end of it. Management of the software is essential once the spam filter has been installed just as the constant monitoring and revamping is needed to keep up with the changes in spam methods. Updating schedules and watch points make security more effective. In order to stay up to date and keep a lot of stress off of your own shoulders, delegate specific monitoring and defensive actions to responsible employees.

Check Points
Set up a chain of command. Construct a solid plan for employee training including who, when, where and how. 1. Have a structure for in house training personnel, support personnel, and application. Designate one person or persons who will contact support outside of the company’s business and make the necessary
33 | P a g e

adjustments to the computer. 2. Instill a concrete training program. Of course, the initial training will have to be completed swiftly. 3. Make a schedule so the training will not disrupt the entire company work day. 4. Once initial training is complete, construct a system of mini seminars and refresher courses. 5. Set up specific days to update employees on changes to the program. 6. Make an orientation program for new hires and returning work force. 7. Schedule internal observation sessions so the trainer can evaluate each terminal user. Determine that the employee can execute and apply his knowledge. 8. Oversee the establishment of each users email address. Change passwords as recommended earlier in the book. 9. Monitor for glitches in the email system. Keep records of Spam that slips by the Spam filter. Define and identify the reasons for the slip. Use this knowledge for training and refresher courses. Monitor the volume of email that the system can 10. handle without problems. Make sure the computer networking links properly to each other. Follow up on disturbances between networks. 11. Follow up on Spam that finds its way from one
34 | P a g e

network terminal to another. Seek support for these leaks. Make sure each computer network terminal is loaded properly and updates are complete and up to date.

Get Rid of the Sludge Checklist
Set up systems for data protection. Utilize back-ups and set up restore points. Set up a system to bring the Spam filter up to date after restoring. Have a contingency program for system failures. Have a firm policy regarding power ups, down loads, and shut downs. Prepare a regular time to clean registries, browsers, and to defrag. Give each employee in the chain of command specific directions and job descriptions regarding the computer system and responsibility for spam prevention. Take steps to protect valuable information before the problems actually occur. It’s hard to locate information that is lost in cyberspace. And most importantly, remember, prevention is the best defense.

35 | P a g e

Chapter Six - More Guards and Options for Spam
It’s time to deal with the different types of spam and programs. This means how they will be delivered and utilized as filtering software. General users on personal computers would most probably download a free or inexpensive software blocking system. A company can’t afford to pick just any old software and download the program. There are other methods of spam and blocking programs to install or use.

ASP or Application Service Provider
In this system, email goes through the ASP first and then it is forwarded to the company. Your company will establish with the ASP the perimeters such as the type of business it deals in and keywords, senders and receivers, etc. The ASP will have a format, which will be completed and then uses this format to forward emails to the company and send the spam to the junk pile. The pitfall to the system, there’s not much - if any - opportunity to inspect the spam folder for mistakes. Let’s take a look at some of the benefits: The Company will not need to change settings and format to its system. Less opportunity to “mess up” and create chaos in the company computer infrastructure. Less likely to lose service in event of major event such as a damaging tornado.
36 | P a g e

Reduction of liability if Company’s format is captured and forwarded to others. This is unlikely since the Company directory will not be directly available. Reduction of employee time dealing with spam, or spending dealing with support personnel. Less time spent with software management like upgrades and changes in spammers ever-changing attack techniques. Less space used on the Company computer since the ASP will carry the program.

Spam and Blocking Programs
The next spam prevention method to discuss is the spam and blocking programs. This type of system is generally what the user typically considers as the only choice available. Of course, this has already proved otherwise. The purchase of a software program is not necessarily the only way to add or use features such as protection programs. By the way, other useful programs can be obtained for use without purchasing but that would be an entire other book. Some information on spam and blocking programs: Puts the Company in the driver’s seat. Email can’t be read by a third party administrator. Manage frequent changes such as whitelist, blacklist, or keywords in house.
37 | P a g e

Manages updates, policy, and support in house. The Company uses space on its system. The Company is responsible for setting the controls, safety features, and directories. Monitors Spam and Directory attacks in house. Knows and manages its employees, their use and their location. Unlike ASP, you might not be apprised of the location or true owner.

External Hardware
Next on the list of Spam and managers is the External Hardware. The external hardware closely resembles the ASP in the aspect that the email goes through the external hardware then to the main system. One big difference, the company owns the hardware, the software, and stays in house. Let’s take a look at some info on external hardware: Basically, the spam and program independent of the main computer network. Not much in the way of changing the main computer operating system. Meaningless tragedy and breakdown. Less potential to directory attack. Total loss if Tornado strikes particular area. Control settings, blacklist, white list, or keywords are left to the Company.
38 | P a g e

Company is responsible for managing updates, patches, and support needs. Overall, less employee time dealing with Spam. More than would be with an ASP, less than the software. Not much data space available.

Preset Spam Blocking Program
The last selection is the installation of a preset Spam blocking program. Installed on each and every terminal. Works independent of each other. Each user manages each aspect of filtering, updates and support. Little control over settings to system. Little control over keywords, white list, or blacklist. Usually checkbook friendly. Usually downloaded. As in every business decision, there are benefits and risks to consider. When choosing a Spam Blocking Option, the Company must weigh the “Risks verses the Benefits”. It goes without saying; the choice made will have a huge impact on the Company computer network.
39 | P a g e

Chapter Seven – More Guards and Options for Spyware
Now, it’s time to deal with the different types of Spyware programs. This means how they will be delivered and utilized as filtering software. General users on personal computers would most probably download a free or inexpensive software blocking system. A company can’t afford to pick just any old software and download the program. There are other methods of Spyware blocking programs to install or use. These are normally paired with the Spam blocking program, but can, and in many company profiles, should be separate. Although the guards for spyware are very similar to that of the spam, we will re-enforce this information and an easy to use list. The instructions will be repeated in a manner of speaking.

ASP or Application Service Provider
In this system, email goes through the ASP first, then forwarded to the company. Your company will establish with the ASP the perimeters such as they type of business it deals in and key words, senders and receivers, etc. The ASP will have a format which will be completed and then uses this format to forward emails to the company and send the Spyware to the junk pile. The pitfall to the system, there’s not much - if any - opportunity to inspect the Spyware folder for mistakes. This is a solution where the Spam and Spyware program would be included within the same coverage as a paired program. The Company will not need to change settings and
40 | P a g e

format to its system. Less opportunity to “mess up” and create chaos in the company computer infrastructure. Less likely to lose service in event of major event such as a damaging tornado. Reduction of liability if Company’s format is captured and forwarded to others. This is unlikely since the Company directory will not be directly available. Reduction of employee time dealing with Spyware, or spending dealing with support personnel. Less time spent with software management like upgrades and changes in Spammers and Spyware programs ever-changing attack techniques. Less space used on the Company computer since the ASP will carry the program.

Spyware Blocking Programs
This type of system is generally what the user typically considers as the only choice available. Of course this has already proved otherwise. The purchase of a software program is not necessarily the only way to add or use features such as protection programs. By the way, other useful programs can be obtained for use without purchasing but this is another book. Spyware Blocking Programs: Puts the Company in the driver’s seat.

41 | P a g e

Email can’t be read by a third party administrator. Manage frequent changes such as white list, blacklist, or keywords in house. Manages updates, policy, and support in house. The Company uses space on its own system. The Company is responsible for setting the controls, safety features, and directory safeguards. Monitors Spyware and Directory attacks in house. Knows and manages its employees, their use and their location. Unlike ASP, you might not be apprised of the location or true owner.

External Hardware
Next on the list of spyware and managers is the External Hardware. Closely resembles the ASP in the aspect that the email goes through the external hardware then to the main system. One big difference, the Company owns the hardware, the software, and stays in house. Another one that would most probably be paired with the Spam protection. Let’s take a more detailed look into the world of the external hardware in the aspect of spyware protection: Basically, the spyware and program are independent of the main computer network. Not much in the way of changing the main computer
42 | P a g e

operating system. This means less tragedy and breakdown. Less potential to directory attack. Total loss if Tornado strikes particular area. Control settings, blacklist, white list, or keywords are left to the Company. Company is responsible for managing updates, patches, and support needs. Overall, less employee time dealing with Spyware. More than would be with an ASP, less than the software. Not much data space available.

Spyware Blocking Programs
The last selection is the installation of a preset Spyware blocking program. Installed on each and every terminal. Works independent of each other. Each user manages each aspect of filtering, updates and support. Little control over settings to system. Little control over keywords, white list, or blacklist. Usually checkbook friendly. Usually downloaded.
43 | P a g e

Spam protection helps with many helpful and necessary matters like time, and the bottom line. Spyware protection does the same, but in the same way provides even more valuable protection. Choosing the manner in which the protection is supplied results in another choice. Do you want this protection in one location or in several locations? The answer to this depends on the following considerations: The size of the company. The location of the company. The nature of business. Number of Employees available to oversee the entire network. Internal support and recovery personnel available. Amount of company dollars available. A company whose primary business deals with extremely sensitive issues would benefit from one central area. In the same sense, individual stations with individual protection might be just as beneficial. Two aspects of the same solution. As in every business decision, there are benefits and risks to consider. When choosing spyware protection options, the Company must weigh the “Risks verses the Benefits”. It goes without saying; the choice made will have a huge impact on the Company computer network.

44 | P a g e

Chapter Eight – Solving Differences
Specific Employee Training & Harmony
Face it, not many employees “LIKE” the idea of mandatory training seminars. Even fewer like the idea of new employee orientation. In like industries, orientation tends to be very similar with only a few minor differences. The exception in this case is the Spam and Spyware blocking program used from company to company, regardless of how similar they are in nature. There are companies whose work is so sensitive that the software programs will vary from area to area. Obviously, the training of this software is of utmost importance. The security of the company is dependent on this. The security of customers is at risk with poor operation. The company is at a liability without the protection. Loss time and productivity is at risk with inadequate performance. Overall, take into focus the training needed. When the majority of the personnel to be trained feel the computer is not so friendly, then the training needs to cater to this particular group. On the other hand, if the users are computer literate genius’ and really savvy, don’t treat them like first graders. Before developing ANY training program, consider the audience. Failure to do so results in failure.

45 | P a g e

Group and Individual Training
Nearly everyone can be taught to use most any software program with the proper hands-on training. Group training is more time effective; however, it definitely requires more physical equipment at one sitting. This is usually an effective method when the group is of mixed experience or the instructor isn’t sure in advance of the group experience. Let’s take a look at how this can adequately be performed:

Preparation:
Know the material that needs to be taught. Outline the facts and check the accuracy. Have handouts, class tools such as pen and paper separated and ready to hand out, pick up, or on each seat. Make sure computers are up and running properly. Plan in advance for breaks, questions, and practice.

Delivery:
Remember a simple rule for speaking: o Start by giving a brief overview with what will be discussed.

46 | P a g e

o Discuss the subject. (Teach the class) o End with a brief review of what wasdiscussed. Remember your audience. Speak precisely and clearly. Keep the class flowing smoothly. Use overheads to bring teaching into focus. Stick to the time format. Don’t get off the subject. Don’t ramble.

Practice:
Give the allowed time to practice. Don’t put practice aside for any reason. Schedule ample time for practice. Have enough tutors to help with practice. Offer guides that help with the hands on practice.

General Points to Ponder:
Don’t make fun or make light of someone’s lack of
47 | P a g e

understanding. Be willing to repeat when necessary. Keep things friendly. Don’t be harsh, condescending, or “too smart” Be professional. Show Confidence. Don’t tell a joke if you “can’t tell a joke” Be calm. Be direct. Be in charge of the class not the other way around. Start on Time. End on Time.

Handbooks:
Handbooks are not the greatest tool for every user; however, they are an excellent tool to issue alongside verbal and hands-on teaching. This goes back to knowing your audience. “Techies” can take a handbook and sail right along. The less than average computer user will probably get more benefit from “hands-on” with the handbook to go along with the classroom training. More often than not, people will need the visual clues
48 | P a g e

and the handbook. Handbooks are most helpful to most users as a reference guide after learning. It’s something they can go back to should a question arise at a later time after the initial training. Try to include hands-on practice and the handbook for users to keep. The company will benefit from the training and references made available to its employees. Attempt to format the handbook in a simple, easy to follow way. Keep instructions with instructions. Put definitions at the beginning of each section, or in a dictionary format at the end – or even both. Be sure to start with a table of contents for the ease of finding specific issues. Techies would probably rather flip to the specific section they need help with rather than reading the entire handbook from the beginning to end. Newbies would rather read from the beginning to the end and be able to understand what they are reading; hence, the use of definitions. It’s important that everyone wins so that your company can be properly protected as well as your customers.

After Training - Getting Ready to Drive
At this point, the software program has been selected. The training has been completed. The computer is up and waiting. With all things in place, what could possibly be left to organize? Well, maybe the actual installing of the Spam and Software Program. Most casual users would just pick the first program they came across and download it. Disaster is waiting to
49 | P a g e

happen with this method. A disaster a company absolutely cannot afford to let happen. Careful planning of the program installation is as important as the program itself. Let’s take a look at a quick mapping of this process: Map out the schedule to install. Select the most vulnerable stations first. Select a time that will not interfere with company operations. Notify each department head. Double check that everyone concerned is on board. Begin with the installation on a small percentage of terminals. Run a test on the terminals after installation. Once all “kinks” are worked through, proceed with the install schedule. During the installation, it’s necessary to have people on board that can help to work through the “kinks”. Also, have the personnel available to offer “touch-up” training to calm last minute jitters and clear any confusion not addressed previously. Remember when preparing the installation; notify customers that there may be a down time. Customers and clients need to be alerted of this information and know who and how to contact during this time period. Otherwise, you could lose customers and clients during this process.
50 | P a g e

Troubleshooting, staggered schedule, support or training personnel and the legal eagles will help make this transition smoother. There can’t be enough planning or assistance when first starting the use of anti-spam or antispyware software. Make less trouble for your employees and in return, you will receive less trouble. Preparation is essential here.

People Helping People
Run time, practice, training; all good points to consider. Make a list of people needed to get the project off and running. Boards, owners, and the bank are usually the first people to approach with any project. Ideas are great, but generally speaking, require money. Outline the program desired. Detail the need. Be sure to include statistics. Detail the benefits. Show the costs including training Create a sense of the cost without a program Invite everyone needed: o Administrators o Bank

51 | P a g e

o Board of Directors o Legal Counsel Once the details are complete, use the time to also include a demonstration for everyone. Discuss the initiation of the Spam and Spyware blocking program with your clients and customers. Let them know there will be some changes, when to expect these changes, and how it will affect their business with you. Consider a test run sending and receiving emails from each. The reason for this is to ensure the smoothness of the installation and to be sure their system is compatible with yours. Have the legal eagles prepare a letter or statement in advance. Why? o In case the first runs are not so smooth. o In case their emails get blocked, and in case the company mail gets scrapped. Understanding is one thing, throwing a wrench into the spokes is quite another. Another major consideration for legal assistance would be the possibility of slowing down required business or sales. Timelines and deadlines could be of major importance with the company’s business and are of utmost importance. Legal eagles will have to read, adjust, and approve the contracts with the provider of the software. There might need to be contracts with customers and clients separately. Contract personnel and outside contracts will need to be
52 | P a g e

revised for appropriateness as well. Finally, company protection from employees is an important consideration in this process. What happens if the employees refuse to follow along with the program? There will have to be changes with the company policy and procedures. There will have to be legal determinations with noncompliance in writing.

53 | P a g e

Chapter Nine - Mapping Samples
The Spam software is installed; the employees have been trained; now, it’s time for the real test.

Test the Spam
What is the real test? The real test is the everyday use of the program with the everyday employees that will use the program. The real test will be to see just how much spam is captured incoming and how much is prevented from being sent. This is really the part where you want to take notice of the actual workings of the anti-spam software. Remember earlier, it was recommended to update immediately? That’s the first thing to be done. After a program is developed and placed on the market, spammers are working to find more and more ways to sneak through. Also, the developers have worked to repair any glitches after the installation by the consumers. Obviously, these issues are not a part of the original software. Update the system on each and every terminal – very important! The next task would be to run a full scan. Perform the scan on each and every terminal – once again, very important! Take note of all the spam and adware discovered. Then, the user should look at the vault or quarantine program. The following will give detailed measures to test and monitor the software. Testing information can be used for more than one purpose.

54 | P a g e

Organize the Test Data
Test Log Data. This should include different measurable data findings: Day, Date, Time of Update Day, Date, Time of Each Scan. Specifics about Spam found in vault Specifics about email that should NOT be in the vault Length of Scan Glitches in scanning: o Includes program issues o Computer system issues o Employee operation issues Glitches in Updating Software: o Includes program issues o Computer system issues o Employee operation issues Glitches in day to day operations: o Includes program issues o Computer system issues o Employee operation issues Calls to In House Support: o Includes nature of issues o Response to the issues o Final outcome Record of Software Support Contact: o Includes nature of issues
55 | P a g e

o Includes Response to Issues o Final outcome Evaluation and comments

Making Use of the Evaluation
This log should be done on a regularly scheduled basis. Make sure these evaluations are performed and occasionally perform an unscheduled scan. After the initial installation, be sure to perform these evaluations much more often. Have printed material at each terminal so each user can record day to day problems or concerns. Look for the following: Compare and Tally results of evaluation. Is there a pattern noted? Is a particular time more vulnerable to spam than others? Examine web sites visited. o Determine whether Spam is found more often after a site is visited. Is the software sending too many needed emails to the vault? o Examine the keywords and program specifications. o Relax the rules and specifications for incoming email.
56 | P a g e

Is the program allowing too much Spam to go out? o Examine the keywords and program specifications. o Restructure the rules and specifications for outgoing email. What response is the in house support staff giving? o Are the problems being resolved? o Does it indicate further employee training is needed? o Is support easily accessible? What response is the software support staff giving? o Are the problems being resolved? o Does it indicate further employee training needed o Is the support easily accessible? The evaluation log helps to see how effective the spam software program is for the company. The tally sheet also is a useful tool to present to the Board of Directors, Owners, Financers as well as excellent orientation tools. This tool can be extremely effective for use by the company.

Spam Testing For Real
The spam blocking program is installed and running. Day to day operations are rolling right along. It’s time to use the evaluation log for real test runs. Schedule specific times for checking the software program in action and thoroughly follow through with the scans. Set these scan checks for various times during a working day.
57 | P a g e

Set the scan checks for different days of the week and different days of the month, etc. Set at least one scan close to a day when many are paid such as the first when most government employees are paid. Schedule a scan around a holiday period, such as Christmas Select two secure terminals within the company to run the first real test. Select several different terminals within the company for regularly scheduled test scans. This protects spam from delivery to customers and clients. Send a sample of regular type email that is usually received and comparable in volume per terminal. Send a sample a sample of regular email usually sent also with a comparable volume per terminal. Submit a small number of emails with obvious spam. Submit a small number of emails with the not so obvious spam. Increase the volume of each of these examples and then overload the volume of emails. Examine the vault for missed emails which should have been received. Examine the vault for dumping after each volume. Check updates to ensure they were installed or just
58 | P a g e

downloaded. Refine keywords, white lists and software specifics as needed according to the percentage of forwarded spam and captured email that should be acceptable.

Spies among Us
Next, test the effectiveness of the Spyware blocking Program. The overall testing of the Spyware is similar for the most part to testing of the Spam blocking program. However, for re-enforcement and an easy list to run down, the instructions will be repeated in a manner of speaking. The Spyware blocking program must be working and usable. The company is at risk when Spyware sneaks in the back door. Since it’s not so easy to see and spot until it’s too late, real and extensive damage can occur until it is secluded and healed. Remember earlier it was recommended to update immediately? With the Spyware blocking program, that’s the first thing to be done also. After a program is developed and placed on the market thieves are working to find more and more ways to sneak through. Also, the developers have worked to repair any glitches after installation by the consumers. Obviously, these issues are not a part of the original software. Update the system on each and every terminal as this is very essential in staying up to date. The next task would be to run a full scan. Perform the scan on each and every terminal. Take note of all the spy ware and tracking cookies placed for cleaning. Then, the user should look at the vault or quarantine program. Like spam, the offenders are sent here, but are not necessarily dealt with in the same manner. Depending where the threat
59 | P a g e

is found will determine the action the software program will take. The following will give detailed measures to test and monitor the software.

Organize the Test Data
Test Log Data. This should include different measurable data findings: Day, Date, Time of Update. Day, Date, Time of Each Scan. Specifics about spyware found in vault. Specifics about email that should NOT be in the vault. Length of the Scan. Glitches in scanning: o Includes program issues o Computer system issues o Employee operation issues Glitches in Updating Software: o Includes program issues o Computer system issues o Employee operation issues Glitches in day to day operations: o Includes program issues o Computer system issues o Employee operation issues
60 | P a g e

Calls to In House Support: o Includes nature of issues o Response to the issues o Final outcome Record of Software Support Contact: o Includes nature of issues o Includes Response to Issues o Final outcome Evaluation and comments

Making Use of the Evaluation
This log should be done on a regularly scheduled basis. Make sure these evaluations are performed and occasionally perform an unscheduled scan. After the initial installation, perform these evaluations much more often. Have printed material at each terminal so user can record day to day problems or concerns. Look for the following: Compare and Tally results of evaluation. Is there a pattern noted? Is a particular time more vulnerable to threats and invasion than others?

61 | P a g e

Examine web sites visited. o Determine whether Spyware threats are found more often after certain sites are visited. Is the computer system running smoothly without slowdown or shutdown? Is the Spyware program preventing entry to needed sites? Can the user operate as usual such as downloading necessary files or shared files? What about sending files or uploading? o Will the Spyware Program allow the user to send out properly? What response is the in house support staff giving? o Are the problems being resolved? o Does it indicate further employee training is needed? o Is support easily accessible? What response is the software support staff giving? o Are the problems being resolved? o Does it indicate further employee training is needed? o Is the support easily accessible? The evaluation log helps to see how effective the spyware software program is for the company. The tally sheet also is a useful tool to present to the Board of Directors, Owners, Financers as well as for orientation tools. This tool can be extremely effective for use by the company.
62 | P a g e

Spy Hunt
The Spyware blocking program is installed and running. Day to day operations are rolling right along. It’s time to use the evaluation log for real test runs. Schedule specific times for checking the software program in action and thoroughly follow through with the scans. Set these scan checks for various times during a working day. Set the scan checks for different days of the week and different days of the month, etc. Set at least one scan close to a day when many are paid such as the first when most government employees are paid. Schedule a scan around a holiday period, such as Christmas Select two secure terminals within the company to run the first real test. Select several different terminals within the company for regularly scheduled test scans. This protects spam from delivery to customers and clients. Use a sample of regular type files and downloads that is usually received and comparable in volume per terminal.

63 | P a g e

Take samples a regular uploads and sites usually sent and visited. This also should be used with a comparable volume per terminal. Submit a small number of downloads, sites, or uploads with obvious Spyware Threats. Submit a small number of files, downloads, uploads or sites with the not so obvious Spyware Threats. Increase the volume of each of these examples, then overload the volume of threats. Examine the vault for missed files and downloads, which should have been received. Examine the vault for dumping after each volume. Check updates to ensure they were installed or just downloaded. Refine keywords, white lists and software specifics as needed according to the percentage of Spyware threats found After one scan is completed, run the scan again just to check the amount not cleaned on the first pass. o Does the program run smoothly or is it slow and sluggish? o Does the program freeze frequently?

64 | P a g e

Chapter Ten – Technical Realm
Day to Day Stuff
Everyday details are necessary. In this case, daily maintenance may not be necessary, but regular maintenance is most definitely a necessity. Start with the top. Spam Filters and Settings: Evaluate the setting regularly. Reset keywords. Examine the increase in spam received. Examine the increase of good email sent to vault. Scan directories. Add program software maintenance to the regular defrag and browser maintenance schedule. This will help the entire system run more effectively and efficiently. Vaults or Quarantine: Some programs have vaults, while some have quarantines. It’s practically the same exact thing, just a different name. Check the size of the program regularly Check frequently the contents of the vault Set alerts to notify when the vault is getting full.
65 | P a g e

Check for reasons vault is not getting full The size of a quarantine folder or vault has various indications. For instance: the larger the folder, the more space that is used. Other stories are told by the folder. If the size is increasing quickly, then the filter settings need to be relaxed. When this happens, more of the good stuff is getting dumped into the spam folder. This will require more frequent examination of the contents to retrieve what is needed. This results in a reduction of efficiency as well as revenue - a good reason to check the contents frequently. Another factor for the size of the vault would be automatic cleaning or dumping. Have you ever lost something because the browser was too full or the memory was full? When the folder is full, it simply can’t hold any more. It overflows. This results in permanent loss of the contents. While this might be preferred when speaking of spam, what about the good stuff? The preferable email is lost right along with the spam. Not a good thing. Of course, the folder can be emptied manually; however, it is easier to empty it on a regular basis. A setting can be applied to alert the user when the folder is getting close to being full. What do you do when a folder is not filling on a not-soregular basis? This means not too quickly. It means that the settings need to be examined to increase its effectiveness. It’s more likely that the settings are lacking in performance than it is there is less spam being sent to the mailbox. Examine and update the white list. Customers and clients change names, new ones are added, products are added and so forth and so on. As these changes occur, the list needs to be changed as well. After all, protecting the
66 | P a g e

company client base is one of the major reasons for installing the program. The last maintenance tool that will be discussed here is updates. Remember earlier in the book, it was recommended to update immediately after installing. The reason that updates are so essential is that because after the software is developed and put into production, changes in spam and spyware methods have already improved. The weasels get better and better. The developers have to accommodate for these new methods. Also, after consumers begin to use the program, “glitches” can appear. The developer has to repair these glitches. The developers configure their own patch. This takes us to operating system updates and patches. Once again, the developers have to update their software to keep up with these changes. Updates are as essential to the software as the software is to the company that uses the program. Without the updates, the user is left wide open without protection. Might as well and put an ad in the paper that reads,

“Wanted: Spammers and Spyware to attack my business.”

Failing to update would make about as much sense.

67 | P a g e

Conclusion
Review of Systems
Each section of this tutorial deals with different aspects of spam prevention then spyware protection. The book was designed to take the company owner slowly through the decision and selection process. In hopes that the wording and meaning is clear and understandable, the company official or owner will take this knowledge to help their company and employees. Spam and Spyware is a time consuming and costly concern. Why do you need to be properly protected? Employees are overburdened with the mountains of spam which flows into the mailbox. Productivity is slowed because the user has to sift through all the email to look for legitimate correspondence. Clients and customer business is at risk because this same legitimate email is accidentally deleted. Unpleasant and costly legal consequences can arise when spam is inadvertently forwarded. Employees are embarrassed and insulted with intrusive, obnoxious pornography that is included with much spam emails. Police investigation and possibly arrests can occur from inadvertently forwarded pornography emails.
68 | P a g e

Employees are lured to sites and are not taking care of company business. Computer systems can be frozen, crashed, and programs disabled from hidden spyware threats. Sensitive company information can be obtained from spyware threats. Passwords and banking account information can be retrieved with spyware methods. Threatening and non-friendly tracking cookies tell the “cat burglar” where, when, and how the user works letting the thief know when, where, and how to strike. Legal liability and costly legal action as a result of spyware sent through employee and company computers. The adverse consequences from spam and spyware threats can go on and on again. The originators of spam and spyware constantly think of and devise newer and cleverer methods to try and lure individuals and companies out of their money. These con-artists and thieves are here for one main reason and that is to get money. Your money. Your company dollars. A few of these misguided attackers just want to cause havoc with the company computer system for no reason other than the fact that they can. Each section of this book slowly builds and explains how to select, manage, and operate spam and spyware blocking applications. Checklists and step-by-step considerations are provided for use. These steps and checklists can be used “as is” or tailored to fit your
69 | P a g e

company’s needs. Since it is apparent that spamming and spyware will not be stopped, efforts to stop them from damaging your company are required. This hopes to help the company do just that: stop damaging threats, thefts and energy draining methods out of your company. This hopes to help the company fight the enemy and put them behind closed doors. Outside the company doors. Outside the company play yard. Out of your hair!

70 | P a g e

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close