Cyber Access Control | MFA Enterprise Password Management | Access Smart

Archive for spam

2012 – The Year of Cyber Espionage?

Lucian Constantin’s recent article “Expect more cyber-espionage, sophisticated malware in ’12, experts say” states that cyber-attacks in 2012 will increase with more sophisticated malware. Certainly companies like MicroTrend, Symantec and others have their work cut out for them to eradicate these attacks once they are launched. But taking a step back, the question arises as to how malware is first getting into the networks.

Answer: employee’s carelessness.

Using social engineering attacks are still the best and cheapest way to distribute malware. Spam emails, phishing, spearfishing, etc., all utilize attachments that can hide the malware. It still is amazing that such an and old and simple method is still the most effective. An according to some experts, educating the employees about information security is a waste of time. I disagree since even if one person is helping by being educated and aware it is better than having none. But education alone is not the solution. Read More→

Is Email Marketing a Thing of the Past?

Is email marketing a waste of time and money by Dovell BonnetEmail flyers and advertisements largely replaced paper flyers, just as online news blogs and sites are largely replacing traditional newspapers. However, email marketing is becoming less effective each passing day because people are so bombarded with spam in their email boxes that they simply are not responding as readily to blandishments to signup for free newsletters or to click on links in emails from people or companies that they have never heard of, no matter how enticing the offer.

Internet security or the lack there of, has made users suspicious and distrustful to all unsolicited emails. Let’s first take the argument from the personal perspective. We all have been hit with spam in our email accounts. We may have also experiences are own email address being hijacked by email spoofers. All with the intent to get the recipient to click a link or open a file to start the process of identity theft. Read More→