TITLE

E-Mail: How Did We Survive Without It?

AUTHOR(S)
Imsdahl, Shane
PUB. DATE
October 2005
SOURCE
Supply House Times;Oct2005, Vol. 48 Issue 8, p62
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses how small businesses can protect their e-mail system as a valuable business tool. Best practice for avoiding e-mail viruses; Use of spam filters to catch legitimate e-mails; Best defense against phishing.
ACCESSION #
18656472

 

Related Articles

  • CipherTrust service protects against nefarious net traffic. Garretson, Cara // Network World;2/6/2006, Vol. 23 Issue 5, p45 

    The article reports that e-mail security technology vendor CipherTrust is prepared to introduce the Real-time Anti-fraud Data and Resource (RADAR) service to prevent customers' brands from being stolen in a phishing attack, and to prevent their computers from being utilized by spam senders. The...

  • Scared of identity thieves? Quinn, Jane Bryant // Good Housekeeping;Feb2006, Vol. 242 Issue 2, p92 

    The article offers information on how to prevent identity theft. It advises to rip financial records before disposing them and destroy the blank checks that come with solicitations for loans and credit cards. It is also important to take everything in the wallet that has the number printed on it...

  • Spam Wars: The Battle of the Formbots. Breeding, Marshall // Computers in Libraries;Jan2007, Vol. 27 Issue 1, p32 

    The article discusses threats to Internet security, as well as guidelines for protecting computer systems from such threats. Spams have become a tool for phishing and identity theft, causing economic and personal damage to its victims. Advanced strategies used by spammers for fraudulent...

  • Kaspersky Lab Anti-Phishing Module.  // Database & Network Journal;Oct2007, Vol. 37 Issue 5, p25 

    The article reflects on Kaspersky Lab's anti-phising module. According to the report, Kaspersky Lab announces that anti-phising databases provided by the Phish Tank service have been incorporated into the Anti-Phishing module of Kaspersky Internet Security 7.0. The system offers a consolidated...

  • Deceptive spam puts banks on the defensive. Solnik, Claude // Long Island Business News (7/1993 to 5/2009);1/27/2006, Vol. 53 Issue 4, p3B 

    The article describes strategies used by banks in the United States to protect online banking customers from identity theft, fraud and phishing. Bank of America has added an extra guard to its password system. Corillian Corp. provides access signature control systems. The Federal Deposit...

  • LinkedIn Letting Sharks Into Corporate Waters.  // OfficePro;Jul2012, Vol. 72 Issue 4, p4 

    The article offers helpful tips to avoid spear phishing attacks in the social networking site LinkedIn. These include using common sense and available tools to avoid being victimized by hackers and connecting only with personally known persons. It also notes avoiding sharing confidential...

  • Avoid Identity Theft; Learn How to Recognize Phishing Scam.  // Employee Plans News;2016, Issue 13, p1 

    The article offers tips from the U.S. Internal Revenue Service (IRS) how to prevent or avoid identity theft. It states that the agency introduced the public awareness campaign called Taxes. Security, Together, as part of its Security Summit effort. Tips to determine and avoid a phishing e-mail...

  • PAYING BILLS ONLINE--SAFELY.  // Consumer Reports;Jul2007, Vol. 72 Issue 7, p7 

    The article offers advice on how to safely pay bills online. The article recommends that consumers pay through their bank rather than a third-party bill-paying service or the biller's web site. Consumers should create a fraud resistant password for online banking and bill-paying. Consumers...

  • Fighting Phishing with Discriminative Keypoint Features. Kuan-Ta Chen; Chun-Rong Huang; Chu-Song Chen; Jau-Yuan Chen // IEEE Internet Computing;May/Jun2009, Vol. 13 Issue 3, p56 

    Phishing is a form of online identity theft associated with both social engineering and technical subterfuge and is a major threat to information security and personal privacy. Here, the authors present an effective image-based antiphishing scheme based on discriminative keypoint features in Web...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics