Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Seven Tips For Avoiding Insider E-Mail Threats

Enterprises are facing a new set of challenges in the war on spam because many of their own employees and end users are propagating -- knowingly or unknowingly -- large volumes of spam and other e-mail-borne threats. That means that serious viruses such as MyDoom or Mytob are launched and travel within the company's network.

Even when an organization implements anti-spam and other security technology at the gateway or employs outsourced services to filter incoming e-mail there is nothing to prevent end users from generating large volumes of outbound spam and other malware that can waste bandwidth and storage, and tie up valuable processor resources on the core mail servers. Because of the limitations of most of these solutions organizations need to implement some effective means of preventing spamming from occurring within their own networks.

These seven tips for 'best practices' and technology approaches should help you to prevent spam from originating within your own community of users. The focus here is on newer technologies, and assumes that your organization has already implemented base-level SMTP protections such as closed-relay mail systems.

  1. SMTP Authentication
  2. E-mail using organizations must require their end users to use SMTP Authentication (Auth) to be allowed to send outbound mail. This is probably the hardest recommendation to implement, but one of the most important in the prevention of outbound spamming.

  • 1