TITLE

Email: Are we all too reliant on our new best friend?

AUTHOR(S)
Schifreen, Robert
PUB. DATE
November 2004
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Nov2004, p12
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This article discusses why people should not rely on e-mail completely. In most industries, e-mail is rarely a matter of life or death. But we all now live and breath e-mail, where once the phone ruled. For example, journalists who, 21 years ago, spent most of their working day on the phone, now rely on e-mail for most of their work. Clearly, e-mail rules. But the total reliance on a relatively immature technology has come about too quickly. There is never a 100% guarantee that a message you send will actually arrive. An incoming messages might actually be a virus. You might miss an important message because it was buried among hundreds of spams. Your incoming messages might be bounced by your service provider because you have exceeded your traffic quota. Your messages might be intercepted by a hacker and divulged to your competitors. A message might be a fake, which does not actually come from the person who name appears on the header. Any or all of which might mean that you miss out in a business meeting, a crucial deal, a fun night out, a new job, or a final chance to catch up with a friend 20 years' standing before they die. It was once the opinion that e-mail was more reliable than snail mail, and that following up e-mail was unnecessary. Nowadays, nobody can be sure.
ACCESSION #
15210106

 

Related Articles

  • Great riches for you! Rapoza, Jim // eWeek;1/16/2006, Vol. 23 Issue 3, p38 

    The article focuses on the benefits of practicing unsafe computing. Most of the users know that one way to detect fraudulent e-mails or "phishing scams" is the lack of one's actual name in the message, something that legitimate e-mails from banks, stores and other businesses always include. The...

  • Dirty dozen spam-retaying countries.  // Database & Network Journal;Feb2007, Vol. 37 Issue 1, p24 

    The article reports on the top twelve spam-relaying countries identified by Sophos PLC in its Security Threat Report 2007. The U.S. remains to be at the top of the list of worst spam-relaying countries. The other countries included in the spam-relaying statistics are China including Hong Kong,...

  • Is spam a threat and how can I block it?  // Computer Weekly;9/16/2003, p62 

    Spam is the biggest consumer of unnecessary bandwidth on the Internet. There is a risk that users receiving huge amounts of unsolicited e-mail may become even more complacent than they are at the moment. Social engineers thrive on end-user complacency and worm outbreaks such as "I Love You" and...

  • Squash the Creepy Web Crawlers. Pelletier, Sue // Insurance Conference Planner;Nov/Dec2003, Vol. 39 Issue 6, p26 

    Presents suggestions from Corbin Ball of Corbin Ball Associates on protecting personal computers and e-mail. Tips on dealing with spam; Information on how spammers send spams to several e-mail adresses; Computer viruses that affect computers.

  • YULE BE SORRY. Nicolle, Lindsay // Computer Weekly;12/16/2003, p26 

    The article focuses that IT security threats are a year-round headache, but the season of goodwill seems to bring them out in sackloads. Hackers, virus writers and organised criminals are anticipating rich pickings over the Yuletide holiday in the knowledge that commercial battlements will be...

  • Performing Triage. H. C. // Entrepreneur;Apr2004, Vol. 32 Issue 4, p39 

    Conqwest Inc.'s technical expertise is tested on an almost daily basis. A specialist in fighting viruses and spam, the firm distributes computer security alerts to more than 2,000 subscribers. Conqwest founder Michelle Drolet thrives on the busy pace at the Holliston, Massachusetts firm. When...

  • A twisted kind of love. Rae-Dupree, Janet; Newman, Richard J. // U.S. News & World Report;05/15/2000, Vol. 128 Issue 19, p24 

    Focuses on the effects of the so-called I Love You computer virus. Details of the virus' spread throughout the world's electronic mail systems; Variations on the original program created by hackers; Estimated cost of damage caused by the bug; Advice for consumers on preventing virus infection.

  • Cloudy future for authentication. Roberts, Paul F. // eWeek;7/11/2005, Vol. 22 Issue 27, p16 

    This article reports that Internet service providers, large enterprises and e-mail security companies are hoping that an industry meeting in New York in 2nd week of July 2005 will breathe life into a flagging effort to thwart spam and e-mail viruses through the adoption of e-mail sender...

  • You've got (junk) mail. Robertson, Edward // Travel Weekly: The Choice of Travel Professionals;10/29/2004, Issue 1742, p94 

    This article reports that ensuring your anti-virus software is up to date and maintaining your e-mail inbox can help to keep the spammers at bay. However, as is often the case, travel agents are finding once they have sifted through the spam, e-mail cold calls and other assorted rubbish, there...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics