Anti Spam / email cyber security

Anti Spam / email cyber security

Anti Spam / email cyber security

Call us today and stop the spam! (813) 409-5566

Wikipedia defines spam as "the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately". This definition reflects the experience of most people who have been bothered by spam. Unfortunately, technical application of the definition is difficult:

How is spam detected?

Anti Spam SoftwareDue to the difficulty of technically implementing the correct definition of spam, many anti spam filter manufacturers use another definition, the "mass mail criterion". According to this, an email is classed as spam if it is sent to a large number of different addressees within a short space of time, possibly also by various senders. Unfortunately, this also includes certain types of legitimate email such as newsletters. On the other hand, individual or low volume emails with clearly abusive content are not detected via the mass mail criterion.

In light of the different definitions of spam, details of detection rates and false classification rates are difficult to compare. At most, they can be accurately predicted on an individual basis, i.e. for each individual user. For this reason, every user must ultimately decide for themselves which emails they want to receive and which they do not, and transmit this information to the spam filter.

The anti spam filter must then reproduce this decision in the best possible way. However, a spam filter must also produce good results for the user even in its basic configuration, otherwise the effort required to 'train' the filter would be shifted to individual users, which defeats the point of an automatic system.

As spam is constantly changing, ongoing filter updates are also very important; the best anti spam filter is useless if it is supplied with outdated information. Spam often comes in waves. These spam waves typically last between a few minutes and a couple of hours. An anti spam filter that updates after the wave has finished would have no effect, and a large volume of unwanted emails would pass through and reach users' inboxes.

A fast and tiered response is therefore important in the event of a spam wave. First, automatic anti spam measures take effect, and then in a second step, new rules that are specially designed for the new type of spam are created and activated. As spam messages also change constantly during a wave, often this process must be repeated multiple times in the course of a wave.

Infomail

The majority of spam emails are very clearly identifiable as spam, but there is a grey area where it is not easy for an anti spam program to determine whether the recipient would want to receive an email or not.

This grey area covers many newsletters, for instance. Newsletters sent by email are legitimate provided that legal requirements are met. In these cases, it cannot be assumed that the emails are unsolicited. The same is true for initial contact by email; although in such cases the email received is unsolicited, it cannot automatically be assumed that it is undesirable.

eMailPlus defines "infomail" as emails that users do not consider undesirable but which disrupt the day-to-day workflow and distract from more important emails. Separate infomail handling is therefore a useful and cost saving feature of the eMailPlus spam filter.

eMailPlus spam filter features

Cloud architecture

eMailPlus uses the principle of the public cloud to protect its customers' systems and networks against attacks from the Internet. To do this, eMailPlus systems are set up outside the customer's internal network, like the outworks of a fortress. eMailPlus forms the gateway for conveying emails from the Internet into the customer's internal network. This offers significant benefits: eMailPlus solutions offer full multi-client capability, and have tiered user permissions. Data is stored hierarchically, ensuring that users are only able to access the relevant hierarchy level at all times. eMailPlus systems are run from several distributed and secure data centers.

Incoming email traffic protection

Mail traffic rerouting

eMailPlus systems are set up as a firewall between the Internet and the customer's IT infrastructure. For incoming email traffic, it is therefore important to ensure that emails sent to the customer from the Internet are routed via eMailPlus systems and not directly to the customer's infrastructure.

On the Internet, the mail exchanger record (MX record) in the domain name service (DNS) specifies which email server is responsible for receiving a domain's emails. To reroute the incoming email traffic, the MX record for the customer's domain is changed so that it points to the eMailPlus mail gateway.

Emails to this domain are then automatically transmitted without further intervention from the sender's mail server to the eMailPlus infrastructure, where they are checked and forwarded to the customer's email server.
ID Pros of Florida

Tax Preparation DC on Facebook IRS Representation Wash DC on LinkedIn

Name  *Required
Phone
Email Address *Required
I'm interested in -
security code
refresh image

Enter Security Code:

Send Form


Cyber Security Partners

Our Partners

Cyber Security Partners

Florida cyber security services

Florida cyber security services

Identity Theft Protection

Legal Protection Plan

Florida cyber security services

Malicious Hardware Protection

Cyber Security Awareness Training

Cyber Security Awareness Training

Cyber Security

Cyber Security

Cyber Security

© 2018 ID Pros of Florida / Total Cyber Security & Identity Theft Protection
PMB 130 13194 US HWY 301 S. Riverview, FL 33578