Spam filters: Making them work
Here are eight ways to get more out of your e-mail watchdog. By Calvin Sun
Computerworld - Spam. It fills our in-boxes, wastes our time and spreads malware -- and it's only getting worse. According to Ferris Research, which studies messaging and content control, 40 trillion spam messages will be sent in 2008, costing businesses more than $140 billion worldwide -- a significant increase from the 18 trillion sent in 2006 and the 30 trillion in 2007.
In theory, e-mail filtering software and appliances allow "good" e-mail messages to pass through while stopping spam. But the filters can mistakenly allow spam to pass through (a false negative), or they can mistakenly block valid e-mail (a false positive).
Typically, after identifying a message as spam, the filtering software either blocks it or quarantines it, letting the recipient review it later. Although the latter method provides a chance to retrieve false positives, it requires time and effort that users often won't spare.
Users and organizations that receive spam pay about four cents per message to delete it, according to Ferris. But Richi Jennings, a Ferris analyst and a Computerworld.com blogger, says the cost of locating missing valid e-mails is far greater -- about $3.50 per message.
Even worse, Jennings says, is that organizations can incur potentially greater costs through missed opportunities because of false positives they never see -- such as a request for proposal that a consulting firm fails to receive.
Combating False Positives
On both the sending and the receiving ends, minimizing false positives is critical for your organization. Here are some steps you can take.
1. Use a spam filter. False positives can leave you wondering if you should simply toss your spam filter. Don't.
False positives can occur even without a filter, such as when a user, seeing multiple spam subjects in an in-box, manually hits "delete" multiple times, not realizing that buried within the list is a legitimate e-mail. A state-of-the-art spam filter catches 97% to 99% of spam, says Jennings, thus helping prevent erroneous manual deletions.
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Integrating security with HP TippingPoint This white paper discusses the components and configuration requirements to implement an Intrusion Prevention System (IPS) for CloudSystem Enterprise.
- Five Cloud Security Concerns You Must Address Security for the cloud era should be information centric, built in, adaptive, and proactive. How can you respond to the new threat landscape...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts