Top steps during the implementation of a project related to Anti Spam Security

  • Incorporation of spam detectors to block malicious/ fraudulent e-mails
  • Installation of filters for automatic detection/ deletion of malicious software
  • Deployment of software for blocking outgoing delivery of sensitive information to malicious parties
  • Implementation of standard anti-virus, filtering, and anti-spam software solutions
  • Formulation of corporate policies for e-mail content
  • Providing a way for customers to validate e-mails
  • Implementing strong authentication at Web sites
  • Regular monitoring of Internet for potential phishing Web sites

(Read more:  Action List Before Adopting a Cloud Technology)

Top implementation mistakes or learning while implementing projects related to the domain

  • Usage of just one email account
  • Keeping spammed-out accounts for a very long time
  • Not closing the browser after logging out
  • Forgetting to delete browser cache, history, and passwords
  • Using insecure email accounts to send and receive sensitive corporate information
  • Forgetting the telephone option
  • Not using the Blind Carbon Copy (BCC) option
  • Being trigger happy with the "Reply All" button
  • Spamming as a result of forwarding email
  • Failing to back up emails
  • Mobile access: Presuming a backup exists
  • Thinking that an erased email is gone forever
  •  Believing that an individual has won the lottery … and other scam titles
  •  Not recognizing phishing attacks in email content.
  • Sending personal and financial information via email.
  • Unsubscribing to newsletters you never subscribed to
  • Trusting a friend's email
  • Deleting spam instead of blacklisting it
  • Disabling the email spam filter
  • Failing to scan all email attachments
  • Sharing your account information with others
  • Using simple and easy-to-guess passwords
  • Failing to encrypt your important emails.
  • Not encrypting your wireless connection
  • Failing to use digital signatures

(Read more:  CISO Guide for Denial-of-Service (DoS) Security)

Top challenges faced during such implementation

  • Which identity should be used and how does it relate to spamming behaviors? An author can create bad content, but the identity from the field of that content might not be the actual author, even if that field is validated. The message might have originated on a compromised machine and used the identity associated with it, unless known to the owner of the machine. Also the operator of the mail-sending network might have nothing to do with creating content, but it might be reasonable to hold the operator accountable for aggregate traffic problems.
  • How is the identity validated (authenticated)? What entity iBls doing the validation? How does it relate to the identity being validated? And why is it trusted? Can the validation mechanism, itself, be tricked?
  • How is an identity being determined to be a spammer or non-spammer? What entity is vouching for the quality of that identity and why is the vouching entity trusted?

(Watch more : An approach to present IT Risk as Business Risk )

Top parameters based on which the success of a project should be measured

  • Content based filtering
  • Body-based filtering
  • Origin-based filtering
  • Blocking

- By Murali Menon, Chief Security Officer, Atos India Pvt Ltd.

More:  Want to share your insights? Click here to write an article at CISO Platform

Votes: 0
E-mail me when people leave their comments –

Priyanka, Co-Founder and Editor, CISO Platform Breach Intelligence, leads our threat intelligence and incident analysis efforts, providing actionable insights to the global cybersecurity community. With extensive experience in cybersecurity leadership and breach analysis, she specializes in translating complex technical threats into strategic intelligence for security executives.

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee

Fireside Chat With Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.)

  • Description:

    We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass). 

    About Sandro:

    Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…

  • Created by: Biswajit Banerjee
  • Tags: ciso, sandro bucchianeri, nab