PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
Using email spam filtering techniques to get rid of spam

This article is part of the Information Security magazine issue of May 2004
Lee Churchman is exhausted by spam--the constant drumming of unsolicited email that tumbles across his mail server. And he isn't the only one. One-third of the calls Churchman receives at his network consulting firm, System Wide Resources (SWR) in Ridgefield, Wash., are from customers wanting to do away with e-mails peddling cheap Viagra, easy weight-loss plans and hassle-free mortgages. "Spam is not a popular subject with me or my customers," he says. "We are all basically sick of it." In a new survey conducted by Information Security/SearchSecurity.com on the business implications of spam, 63 percent of respondents said the responsibility of paring bulk e-mail falls to senior executives and security managers, forcing them to devote time they don't have to solving this seemingly trivial problem. "I can't skip any of my other tasks that help to keep the agency running," says Norman McIntosh, the information systems manager at D.A. Blodgett Services for Children and Families, a family resource center in Grand Rapids, Mich. "That ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Should new information securty laws include auditing requirements?
Get your security act together or Adam Putnam will do it for you. Federal information security laws and regulations could be the next thing infosec management has to worry about. Here you will learn about pending security laws requring security auditing requirements in this feature.
-
Secure data transmission with wireless access controllers
Sending data over the airwaves is risky. Wireless access controllers assure secure data transmission and reception.
-
Why and how the CISO job description is changing
The Chief Information Security Officer (CISO) job description is changing. The new CISO must know how to quantify risk and how to understand business as well as computer security technologies.
-
Using email spam filtering techniques to get rid of spam
Filters stem the flow of junk email, but spam remains a big distraction. Learn how to use spam filtering techniques to get rid of spam.
Columns in this issue
-
Government cybersecurity: What is being done to fight cybercrime?
Learn what can be done to fight cybercrime against privately owned networks.
-
Industry needs less ethical computer hacking, more risk management strategies
Enterprises need less ethical computer hacking and a better risk management strategy.
-
Enhancing secure coding practices to secure your machine
Learn preventative measures to help improve secure coding practices and protect and secure your machine from the latest threats.
-
Laws of security: 10 security best practices
Learn the laws of security and 10 security best practices.