<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spam Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/spam/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/spam/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Mon, 23 Oct 2023 21:21:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Spam Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/spam/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</title>
		<link>https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 23 Oct 2023 21:17:27 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Spear Phishing]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5689</guid>

					<description><![CDATA[<p>Most people realize the extreme importance of training employees to recognize and avoid phishing emails. But there are other essential components. &#160; Keep Personal Matters Out of Company Email: Attackers sometimes gain access to websites used for personal activities like watching movies, paying utility bills, personal checking accounts, and more. Bad actors leverage this information [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/">Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Most people realize the extreme importance of training employees to recognize and avoid phishing emails. But there are other essential components.</p>
<p>&nbsp;</p>
<h3>Keep Personal Matters Out of Company Email:</h3>
<p>Attackers sometimes gain access to websites used for personal activities like watching movies, paying utility bills, personal checking accounts, and more. Bad actors leverage this information to craft convincing email messages, enticing users to click on malicious links or open harmful attachments.</p>
<p><strong>If your workers avoid using their business email for personal activities</strong> like online shopping or personal social media, then a phishing email related to these topics would immediately stand out as suspicious. <strong>They are much more likely to recognize the message as fake.</strong></p>
<p>On the other hand, if they have used their business email for personal tasks like online shopping or social media, they&#8217;re at a higher risk for spear phishing when an attacker knows details about their activities. If they receive an &#8216;urgent message&#8217; related to these personal tasks in their business email account, they might be more easily deceived into thinking it&#8217;s legitimate.</p>
<p>&nbsp;</p>
<h3>Worsened Notification Burden:</h3>
<p>Another drawback of using work emails for personal matters is the heightened risk of exposing sensitive personal data. If <strong>employees use their work email to conduct personal business</strong>, such as insurance applications or other private matters, the <strong>likelihood of sensitive personal data residing on your servers</strong> increases. In the unfortunate event of a data breach, their sensitive information could necessitate you sending notification letters to affected parties, <strong>increasing your company&#8217;s expenses and vulnerability to potential lawsuits.</strong></p>
<h3></h3>
<p>&nbsp;</p>
<h3>Personal Webmail on Company Devices is a Significant Security Risk:</h3>
<p>The above situations refer to workers using their work address for personal use. But you must also address the issue of allowing employees to access personal webmail on company devices. <strong>IT departments have no control over the security of these personal email accounts</strong>. While your business email systems can have robust filters to block malicious links and attachments, allowing workers to access personal webmail sites can significantly reduce the overall security of your network, <strong>making your organization&#8217;s security as weak as the weakest personal email account.</strong></p>
<p>&nbsp;</p>
<h3>To Enhance Security:</h3>
<ol>
<li>Ask your IT Team to <strong>limit email access</strong> on company devices <strong>to approved business email servers only.</strong></li>
<li>Continuously <strong>remind employees to use their company email address exclusively for work</strong>-related matters.</li>
<li>Ask your IT team to <strong>block access to all webmail sites except those essential for business</strong>. If employees need to access personal email, they should do so on their personal devices. If connectivity is an issue and you must allow employees to connect personal devices to your Wi-Fi, use a separate &#8220;guest&#8221; network instead of the primary company network.</li>
</ol>
<p>&nbsp;</p>
<h3>Conclusion:</h3>
<p>By drawing clear boundaries between personal and professional email usage, you can reduce the risk of cyber threats and help protect your company and your employees. Please tell your associates and friends; spread the word.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/" target="_blank" rel="noopener">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>(Image source: Bing. Learn more at [Bing.com].)</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/executives-guard-your-companys-future-why-ensuring-email-boundaries-is-crucial-for-security/">Executives, Guard Your Company&#8217;s Future: Why Ensuring Email Boundaries is Crucial for Security.</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Will You Do if Your Customers’ Spam Filters Block Your Messages?</title>
		<link>https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 03 Dec 2019 08:00:22 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Blacklist]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[blocked server]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[prevent blacklisting]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3005</guid>

					<description><![CDATA[<p>One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. What will you do when you send invoices, but [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/">What Will You Do if Your Customers’ Spam Filters Block Your Messages?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the ways your spam filter helps to stop unwanted messages is to block messages from mail servers with a bad reputation for spamming. What will you do if your company gets labeled as a spammer? First of all, nobody will receive your company’s messages. <span id="more-3005"></span></p>
<p>What will you do when you send invoices, but your customers never receive them?</p>
<p>When you reply to your customers’ email messages, and they never receive your reply, what will you do when they think you are ignoring them?</p>
<p>What if your prospects never hear back from you?</p>
<p>Being blacklisted can cause havoc at your company because of lost communications. A common way to get blacklisted is to send repetitive email messages, such as a newsletter, from your email server. Instead of risking being blacklisted, many organizations use an email newsletter service to send newsletters.</p>
<p>A growing problem is when attackers take over your email server to send spam. The next thing you know, you’ll be blacklisted, and your email messages won’t reach your recipients. AI technology escalates the sensitivity of spam filters that feed blacklists.</p>
<p>Over the past several weeks numerous customers experienced instances when their email messages do not reach customers who use Office 365. Microsoft’s spam filter is very aggressive, and it is close to impossible to get Microsoft to stop blocking your organization’s email messages after their servers disapprove of your email addresses.</p>
<p>Sometimes your messages are blocked because of a long signature.</p>
<p>Even if an attacker cannot access your servers, all they need is one user’s email address in your company. If they use the user’s account to send out spam messages, spam filters may put your entire domain on a blacklist.</p>
<p>The key is to protect your email accounts and your email servers. Be sure your network and cloud security is substantial. Revisit your email server’s security, as well as your users’ accounts security, regularly to avoid being blacklisted.</p>
<p>Please forward this to your friends, so they know about blacklists too.</p>
<p>The post <a href="https://fosterinstitute.com/what-will-you-do-if-your-customers-spam-filters-block-your-messages/">What Will You Do if Your Customers’ Spam Filters Block Your Messages?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Spammed by a Taxi</title>
		<link>https://fosterinstitute.com/spammed-by-a-taxi/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 19 Jan 2017 17:33:42 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Spam]]></category>
		<category><![CDATA[Airport Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Email Spam]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Real life Spam]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Taxi Security]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2420</guid>

					<description><![CDATA[<p>Spam isn’t just for email anymore. I just landed at Kansas City International airport. They don’t have a taxi line; passengers go to a special taxi phone, lift the handset, and the taxi dispatcher said, “Taxi 1515 will be there in 2 minutes.” Less than a minute later, a man approached saying, “I am the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/spammed-by-a-taxi/">Spammed by a Taxi</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Spam isn’t just for email anymore. I just landed at Kansas City International airport. They don’t have a taxi line; passengers go to a special taxi phone, lift the handset, and the taxi dispatcher said, “Taxi 1515 will be there in 2 minutes.” Less than a minute later, a man approached <span id="more-2420"></span>saying, “I am the taxi you called.” His car was a black Nissan sedan. Sort of like getting a spam email message that contains spelling errors, he was giving away clues that he was bogus.</p>
<p>I decided not to click. In other words, I thanked him and walked away.</p>
<p>He came after me, showed me an airport security badge that looked official, and reassured me that he is the taxi I called. I asked him what his taxi number was. He made up a number 1212.  I told him no, so he jumped in his car and sped away.</p>
<p>Soon, a taxi showed up, painted like a taxi, with the number 1515 on the windshield. That’s the taxi I expected. The driver said that kind of thing goes on frequently, costing real taxi drivers income.</p>
<p>So the concept of spam messages, bogus people trying to get users to click, extends beyond email. In fact, that misleading problem has likely been around ever since business started. The victims are trusting of the wolves. Spam is no different. Teach your workers, and your family, to follow the admonition: Trust, but verify.</p>
<p>And how did that guy get an airport security ID anyway?</p>
<p>The post <a href="https://fosterinstitute.com/spammed-by-a-taxi/">Spammed by a Taxi</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
