Top Banner

of 71

Protect Yourself From Spam and Spyware for Newbies

May 29, 2018

Download

Documents

bea666
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    1/71

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    2/71

    Protect yourself fromspam and spyware

    for Newbies

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    3/71

    2 | P a g e

    Table of Contents

    PROLOGUE ........................................ 6 CHAPTER ONE - THE BARE BASICS .... 7 WHAT IS SPAM? .......................................... 7WHAT IS SPYWARE? ..................................... 8

    CHAPTER TWO - ESTABLISHING A

    CONNECTION .................................. 10 DETERMINE THE NEED .................................. 10PUTTING YOUR EMPLOYEES IN THE KNOW ........... 12EXECUTION............................................... 13FREQUENT SAFEGUARDS ............................... 14EVALUATION.............................................. 16

    CHAPTER THREE - MAPPING ........... 18 MORE ABOUT CHOICE................................... 18ActiveX and Java ........................................... 19Browsers and Registry .................................... 19Cookies ........................................................ 19Beginners and Students .................................. 20A Few Key Employees .................................... 20Get your employees to commit ........................ 20

    SETTING THE STAGE .................................... 21

    CHAPTER FOUR BE IN THE KNOW 23 KNOW THE ENEMIES .................................... 23KNOW YOUR FRIENDS .................................. 24

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    4/71

    3 | P a g e

    FINE TUNING............................................. 26COMPARING AND PRICING OF SPAM BLOCKING

    SOFTWARE ............................................... 28Research ...................................................... 28Price ............................................................ 28Support and Upgrades .................................... 29Training ....................................................... 29References ................................................... 29

    COMPARING AND PRICING OF SPYWARE BLOCKINGSOFTWARE ............................................... 30Research ...................................................... 30Price ............................................................ 30Support and Upgrades .................................... 31Training ....................................................... 31References ................................................... 31

    CHAPTER FIVE - RELATING TOOTHERS .......................................... 33 FORGETTING THE SAFEGUARDS........................ 33CHECK POINTS .......................................... 33GET RID OF THE SLUDGE CHECKLIST................. 35

    CHAPTER SIX - MORE GUARDS ANDOPTIONS FOR SPAM ....................... 36 ASP OR APPLICATION SERVICE PROVIDER........... 36Spam and Blocking Programs .......................... 37External Hardware ......................................... 38Preset Spam Blocking Program ........................ 39

    CHAPTER SEVEN MORE GUARDS AND OPTIONS FORSPYWARE ................................................. 40

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    5/71

    4 | P a g e

    ASP OR APPLICATION SERVICE PROVIDER........... 40SPYWARE BLOCKING PROGRAMS ...................... 41EXTERNAL HARDWARE .................................. 42SPYWARE BLOCKING PROGRAMS ...................... 43

    CHAPTER EIGHT SOLVINGDIFFERENCES ................................. 45 SPECIFIC EMPLOYEE TRAINING &HARMONY......... 45GROUP AND INDIVIDUAL TRAINING ................... 46Preparation: ................................................. 46Delivery: ...................................................... 46Practice: ....................................................... 47General Points to Ponder: ............................... 47Handbooks: .................................................. 48

    AFTER TRAINING -GETTING READY TO DRIVE ...... 49PEOPLE HELPING PEOPLE............................... 51

    CHAPTER NINE - MAPPING SAMPLES....................................................... 54 TEST THE SPAM.......................................... 54ORGANIZE THE TEST DATA............................. 55MAKING USE OF THE EVALUATION .................... 56SPAM TESTING FOR REAL .............................. 57SPIES AMONG US........................................ 59ORGANIZE THE TEST DATA............................. 60MAKING USE OF THE EVALUATION .................... 61SPY HUNT ................................................ 63

    CHAPTER TEN TECHNICAL REALM 65

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    6/71

    5 | P a g e

    DAY TO DAY STUFF...................................... 65CONCLUSION .................................. 68 REVIEW OF SYSTEMS ................................... 68

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    7/71

    6 | P a g e

    Prologue

    Todays world is full of scams and con-artists. Now, theschemes flow vastly and freely in cyberspace. Spam andSpyware can and will, if left unattended, clog up yourcompanys computer network. A company wouldnt eventhink twice about running their computer system withoutvirus protection. Protection against these other threats isequally as important and necessary. In short, inadequateprograms will leave your business without protection.

    The purpose of this book is to help steer the businessowner in the right direction. Choosing the proper programcan be difficult without the proper information. Many factorswill play a part when deciding on the program for yourbusiness.

    This book will break down some of the more difficultand technical components into day to day language to help

    you understand more about spam and spyware, which are ina way the same, but in a way, very much different.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    8/71

    7 | P a g e

    Chapter One -The Bare Basics

    A good starting place would be basic information aboutSpam and Spyware. Understanding a problem goes a longway in finding a solution. The company owner must selectthe program, install the program, and then train theemployees in the proper use of the program. You couldhave the best programs in the world but without properinstallation and use, the program would be useless. Thiswould be like filling up the swimming pool and not pluggingthe drain. You get absolutely nowhere.

    What is Spam?

    Spam is like a close relative to junk mail. Junk mail isjust that, JUNK. Spam is the bad apple ready to spoil theentire batch. Spam tries to lure you to a particular site andtries to sell you something. Spam uses clever methods toswindle money from even the smartest. While spam is

    working its black magic on your companys computers,malicious viruses and Trojan worms are sneaking in the door.Seemingly innocent and appropriate spam entices the userto open and read the email. Subject lines often give noclue. Spam is the ultimate in cons -- it is a liar and a cheatand very hard to detect.

    Employees have to sort through all the email and weedthe good from the bad. Emails are accidentally deleted that

    should have been saved. The mailbox becomes full andimportant email is lost. Spam is frequently filled withpornography that usually has a computer virus embeddedwithin the body of the mail.

    The company loses valuable time. Spam can be filteredthrough the company and passed to other companies and

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    9/71

    8 | P a g e

    individuals. This action can cause a law suit against yourcompany. A large amount of time can be spent trying torepair damage. A large amount of money can be spent

    paying for the repairs. An entire network can potentially beshut down. The productivity of the entire company would beaffected causing a loss of revenue.

    What is Spyware?

    On the other hand of spam, spyware is like a sleazy,sneaky Cat Burglar. It watches potential victims. It sneaks

    in and steals valuable information from your company.When a site is visited, a fingerprint is left. This fingerprintcan trace directly to the computer system that accessed theprogram in the beginning. Spyware looks into the innermost workings of a computer. It goes behind the dead-boltand surveys the room.

    Sensitive company information can be exposed. Thisinformation can be used to steal your assets. Besides the

    deliberate stealing of revenue, company information can beused in other harmful ways. The companys information canbe used to scam others or set up a bogus store front.Identity theft can be a huge nuisance and can definitely besomething that could arise in this case.

    Another potential problem from spyware can be theloss of company secrets. Tracking your every move -- justwaiting and looking for company information. Key loggers

    track information typed or where the mouse is clicked toobtain passwords and user ID. Most companies desire tohide the delicate information that make the foundationfunction and prosper. Spyware can be as dangerous to thatfoundation as a virus can be.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    10/71

    9 | P a g e

    Legal protection is available. Internet Service Providersare eager to catch and prosecute the offenders. Local,State, and Federal agencies have special task forces to do

    their own tracking for these felons.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    11/71

    10 | P a g e

    Chapter Two -Establishing a

    Connection

    Determine the Need

    Determining the need may seem a bit redundant. Theneed is obviously for Spam and Spyware blockers. Theactual choosing of the proper program will be more involved.

    Begin with the following considerations:

    How many employees are in the company? How many computer terminals are utilized? Are the employees in one proximity? Are the employees spread around the country? Which terminals receive emails? Which terminals send emails? How much Spam does the company receive? How much Spyware does the company receive? Does every employee receive and send email? Are computers linked or are they separate?

    The size of the company and number of terminals will

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    12/71

    11 | P a g e

    have the biggest impact in the selection of a blockingprogram. Terminals in one location and linked usuallyrequire one program with a fee for multiple users. Terminals

    in different locations but are linked usually require morethan one program with a fee for multiple users. Multiplestand alone systems usually require a program for eachterminal.

    The volume of email sent and received will determinethe type of program. It goes without saying that the higherthe volume, the higher the risk. The program will have to beset so the offensive is filtered out while allowing important

    emails to arrive in the mailbox. Most Internet ServiceProviders (ISPs) have Spam and Spyware programs includedwith their service. These programs will have to be set also.It is still recommended that a blocking program bepurchased in addition to that of the Internet ServiceProviders. The available space on the hard drive will beaffected as Spam is filtered and offenders are sent to thequarantine vault.

    Just how savvy are the employees computerskills? Some of the blocking programs are complicated andrequire advanced user installation.

    How many w ill you have to train at a sitting?Training will be vital to the usage of the program unless youwant the terminals frozen. Consider the difficulty of theentire training process and the length of time required totrain.

    Support is another consideration to ponder. Notall programs offer technical support with their blockingsystem. This could be an additional cost. However, youshould keep in mind that support is vital. Regardless of howsimple a program is to use, something will go sour and

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    13/71

    12 | P a g e

    technical support will be required. Getting the support ofthe employees will be necessary. Unwilling staff will makeutilization of the program difficult and not run smoothly.

    Some questions to consider:

    Do updates come with the program? Are they included in the cost or additional?

    Each one of these factors will determine the rightblocking system the company will require. Make a list and

    then start window shopping. If a program offers a trial,consider using it on one or two of your terminals in variouslocations. If they dont offer a trial, ask for one and see ifone is available. Be sure they know you are comparisonshopping as this may make one available even if it wasnt tobegin with.

    Putting Your Employees In The Know

    Employees should be consulted about the types ofSpam and Spyware they receive.

    Things to consider:

    How much of each do they receive on a daily basis? Are they plagued by pop-ups or mainly emails? How likely are your employees to be lured to a site?

    Keep in mind, these spammers and sneaks are veryclever. They can even make the email seem as if itoriginated within the company. They can change the address

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    14/71

    13 | P a g e

    and make it look like you are at an official site in which thecompany does business.

    Prepare employees for the installation of the blockingsoftware. When installing software for a large network ormany different terminals, coordination will be advised. Youwill want to set a time so preparation at the work station isdone. Meaning, backups made, important work and emailsor other data is properly saved. Prepare installation for atime when there is less overall usage or at night whenemployees are away. Staggering the installation might benecessary.

    Execution

    Just how does the software program protect a systemfrom invasion?

    The program is either installed using a disk provided orit is downloaded.

    Once installed, registration is required. Most softwareprograms will send a key to unlock the program foruse.

    Acceptable addresses are placed in the filter. Unacceptable addresses and key words or phrases are

    placed in the filter.

    Alerts and notifications of unsafe locations are placedinto the filter.

    Once this is complete, run the program. Observe thescanning and be sure everything is working properly and set

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    15/71

    14 | P a g e

    to the proper specifications for your needs. After this,regular scans for Spyware, Spam, and tracking cookiesshould run. Any offenders will be placed either in a spam

    folder, in quarantine, healed, or deleted. This will depend onthe settings you specified during installation. Emails placedin the spam folder can be viewed to ensure an acceptableemail was not sent to this folder. In the early stages of theprogram, this would be advisable.

    Frequent Safeguards

    Regular maintenance is necessary to keep eachterminal running smoothly for both the business and theblocking software. In order to maintain harmony, certainsafeguards need to be set up and followed.

    Check the vaults. Clear frequently to avoid sluggishperformance. Valuable disk space is used with thequarantine vault.

    Review and update the acceptable emails and sites.This is referred to as a white list - Meaning the goodguys. As more and more spammers and spyware areintroduced, the program has to be informed to preventthe good guys getting placed in the wrong area ordeleted.

    As the blocking software works, the unacceptableemails and sites will also be working. These

    undesirables are frequently referred to as a black list.This will require restructuring of the software to capturethe bad guys. Settings will need to be changed,informed, and updated.

    To keep the blocking software program working for your

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    16/71

    15 | P a g e

    company, regular updating of the program will berequired. Just as the user has to adjust the settingsregularly, the software program has to be kept current.

    New schemes and threats are developed each andevery day. As these become apparent, the parent tothe blocking software works to add to the programspecific to these threats. Also, changes in the internetprograms, operating systems or email service willrequire bringing the software current. Think of updatesas reinforcements for the working army.

    Set a regular schedule for these operations and seethey are followed. In the early stages of the program,it would be in the best interest of the company to set amore frequent maintenance operation. As the usersbecome more familiar with the software and settingsseem adequate for your needs, then it would probablybe safe to lengthen the time for the schedule.

    Consider automatic updates and downloads for theblocking software. This would prevent a delay in major

    updates that could be serious threats to the computers.It would also be a good idea to have specified personswithin the company to oversee these maintenanceoperations. This should be someone familiar andcomputer knowledgeable. Make sure the networkcomputers are getting the updates and performing themaintenance required. Make sure each network isgetting use of the entire system including alerts,automatic updates/scheduled updates. This would be

    especially important for the terminals not close andindependent computer systems.

    Just like regular maintenance for your car such asregular oil changes are needed to keep the automobilerunning smoothly. Regular computer and software

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    17/71

    16 | P a g e

    updates are required. Remember, nothing is going towork for your company if its not used. Programswithout updates will soon begin to look like a piece of

    Swiss cheese that is full of holes.

    Its a little like homework. Homework that is completeand kept up helps school go smoother. Homework that isnot completely done or not done makes it hard at school.Youre not armed with enough knowledge to pass the test. Ablocking software program not checked daily and notupdated is not going to make the grade and give thecompany the protection it needs.

    Evaluation

    Ok, homework is done and now comes the mostimportant aspect. Which blocking program should bepurchased? Its time to sit back and take stock.

    Here is a checklist to work with:

    Evaluation of the companys computer network hasbeen completed.

    There is an accurate count and location of each thatuses the internet and gives and receives email.

    Employees have been evaluated to determine thenuisance from Spam and how often they are mistakenlytaken to an undesirable site.

    Consideration for the employees knowledge to use theprogram is noted.

    Training schedules have been established.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    18/71

    17 | P a g e

    A comparison between different programs has beencompleted.

    The comparison includes the cost, support, upgradesand training of the employees.

    Computer system has been evaluated to the size. Computer system has been evaluated for system

    requirements.

    Now, a choice can be made. After the choice is made andthe software is installed, you should do the following:

    Take note of the working aspects of the software. Look at the settings and check for accuracy and need. Make sure the companys computer network is

    operating without difficulty.

    Make sure access is still available to frequently usedweb sites, company home page, and email.

    Train and learn the software program.In the next chapters, more detail will be discussed

    regarding the specifics of Spam and Spyware.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    19/71

    18 | P a g e

    Chapter Three - Mapping

    Remember the definition of spyware? Spyware is amethod to get information about your company without yourpermission and without your knowledge. It will follow thepaths of the user and send it to the originator of thispredator. Spyware also records the users key strokes inorder to configure passwords, account information, andcompanys vital information. Because Spyware can obtainsuch valuable information and sensitive information, thischapter will map out specifics to choosing a Spyware

    Blocking program.

    More about Choice

    Every company and every personal computer user triesto access only the trusted site zone, email from and toknown associates and so on. Regardless of how careful theuser is, theres always a point of entry to access.

    Consider the news in just the past few years. Therehave been reports of programs requiring a patch afterdiscovery of a Trojan worm or virus. There have beenreports where one individual was responsible for massspamming and use of spyware to steal millions. These aresimply just warnings of emails and software downloads thathave been spam or some type of spyware; yet, we still seemto not take action at the most critical times.

    We cannot be expected to do this alone nor should wetry. Spyware blocking software examines critical areas andprograms on the computer system.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    20/71

    19 | P a g e

    ActiveX and Java

    These are two programs used in every operating systemusing the internet. This is an area where spyware frequentlygains access to the system and tries to hide its presence.

    Browsers and Registry

    Spyware programs gain access by attaching itself to each.This allows total freedom for attacking the home page, andanywhere the user travels using the internet.

    Cookies

    Cookies are used to track your use. While there can beadvantages, this is the ultimate in spying on the users everymove. Every move the user makes will get a cookie.

    Spyware blocking programs scan these importantaspects of the computer and any other or all files in thesystem. Then the program will remove, heal, or jail theoffenders. This includes fixing registry items or changes toprograms.

    Many of the same considerations are necessary whenchoosing Spyware removal programs as in anti-spamprograms. One major difference would be the gateways tothe companys sensitive information. A functional and usefulspyware blocking program must take care of these offendingmethods to the company computer system.

    Lets take a quick look at what you should look for:

    The system should have an alert system.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    21/71

    20 | P a g e

    The removal software should have ability to scandifferent settings one being the entire computer

    network and another for particular files, programs, etc.

    Support should be included. Again this may be includedor have to be purchased separately.

    Most important, Updates, Updates, and more Updates -with a notice when new updates become available.

    Beginners and Students

    Preparing employees to utilize the program will beimportant for proper function of the program. Set up athorough instruction to the workings from beginning to end.Include in this instruction how to manage and look forupdates. Include how and when to seek support.

    A Few Key Employees

    Consider selecting a few employees who oversee theSpyware blocking program. These workers can help keepthe other users up to date and train new users. It is a bighelp to have a few select people to manage updates, scans,vaults and support. The fewer people managing theprogram though, the fewer mistakes there will be with theuse of the program.

    Get your employees to commit

    Spyware to the company computer network is like aspy in the government. Both strive to get secrets and

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    22/71

    21 | P a g e

    valuable information. Both take this information and use itin ways that can cause serious, unrecoverable assets andoperations. Therefore, its important to ensure that your

    employees are aware of all the proper procedures andpolicies so that everything will run smoothly; otherwise, ifyour employees do not commit themselves to this it coulddrastically fail.

    Setting the Stage

    After installing the program, immediately run a scan.

    The program will give an option for the initial scan. ChooseYes. You will be surprised at how much Spyware is containedin the companys computer network.

    Test this again by signing on to the internet andbrowsing for 5 to 10 minutes. Then run the removalprogram again. Again, youll be surprised by the amount ofSpyware offenders in your system.

    Some helpful tips:

    Use the tutorial program for operation of the program. Follow the guidelines for settings and security. Make sure the internet programs and emails work

    properly.

    This might sound funny but check for updates.Programs that are on disk or downloaded are of specific

    format and content. Updates and changes to the programmay have come out since the development of the originalprogram.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    23/71

    22 | P a g e

    So, lets do this:

    Develop a regular scan system. This is best doneduring down times or periods of slow use.

    Dont have the internet open when you scan. Also, scan at other various times between the

    scheduled scans.

    Scan when programs become sluggish or frequent erroralerts appear.

    KEY NOTE: Dont be shy about running scans for Spyware.This feature cant be over used.

    Spyware blocking programs can save the companyvaluable time, loss of revenue, and from the loss of sensitiveinformation. Proper training, use, and maintenance of theseprograms are absolutely essential for proper protection.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    24/71

    23 | P a g e

    Chapter Four Be in the Know

    Know the Enemies

    When trying to rid the companys computer network ofspam and spyware, it helps to know how the threats work.Numerous methods are used to gain entry to the computer.Unfortunately, newer ideas will come up from thesepredators on a daily basis and we simply cannot keep up.

    The most well-known vehicle for spam is email. TheSpammers will buy email in mass. The sellers of theaddresses come from various methods. Web sites thatrequire a user to register most often sell email addresses.Some web sites just require the user to enter their emailaddress or the address and a password. The user can betthe email address will be sold. Regardless of the promises,the email address is sold.

    Email addresses are practically free for picking atcertain sites. Web based support groups, chat rooms, andeven fan clubs are open to any user. The spammer simplyopens the site and has access to masses of email addresses.Requesting the email address be removed results in thisrequest to be sent to many. Information from the differentgroups, survey responses or some type of specific dataretrieved from these sites is vital and necessary for thebusiness and because this happens, the company network is

    vulnerable.

    Directory attacks are really fairly easy for the spammer.The average user doesnt even know that the directory isopen and so friendly. This happens through the internet inwhich the email is received.

    The company should check to see if VRFY is supported

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    25/71

    24 | P a g e

    and turned on. This method of attack can result in massspam emails to every computer the company has in use.

    Spammers are getting cleverer at by-passing the spamfilter settings each and every day. This is achieved innumerous inventive ways.

    The villains will send out emails that look absolutelyreal.

    The illegal use of various company names as the senderis used.

    Mass emails are sent with the same content butdifferent content in the subject line.

    Another method used is to deliberately type in extraletters, numbers, or characters within the words in thesubject area. Since the filter cant read the key wordsthat indicate spam the email is allowed into the in box.Blocking these addresses is difficult since they

    constantly change both from the origin and the arrivalof the email.

    But, why all the effort to get the spam to you? Simple -Money. If a hundred emails are sent and they get oneresponse, they get money. They make money from the saleof addresses. Spamming is big business. Illegal, but big.

    Know Your Friends

    Spam filters work to keep predators away. They needto be told what to do and who to do it to.

    How can you help? Lets take a look at a quick list of

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    26/71

    25 | P a g e

    things that you can do in order to help your spam filterswork properly and keep the awful predators away from yourcompanys computer and computer system.

    Customize the keyword list frequently. Add the address from spammers even though it will

    probably change.

    Set the filter to recognize emails offering something tosell. The filter can recognize part of the name

    Check frequently for patches. This can be done best bygoing to the home page of the operating system used.

    Spammers work hard to get to you. The operatingsystems work hard to keep them away. Patches cover themeans in which the spam entered. An operating systemalso tries to upgrade its program to be more sophisticated inorder to outsmart the offenders.

    What are some other ways you can help?

    Watch for notices and alerts of patches available. Keep the companys spam filter updated frequently. Run the scans. Dont just rely on the preset days and

    times to scan.

    When entering sites that require the email addressand/or other information, change the password often.

    Change the password to the companys computersystem often.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    27/71

    26 | P a g e

    Dont let these changes be predictable, if at allpossible. Re-work the password at odd and varioustimes. Never set a specific day and time to reset

    passwords.

    Learn to recognize spam; dont rely on the programalone. Train the employees in techniques used byspammers. Train the staff to recognize suspect subjectlines and bogus content from addresses.

    Fine Tuning

    Begin with the capabilities of the companys computernetwork.

    What is the size of the system? Does the company plan to increase or add to the

    system?

    How much work will be required of the computer?The answers begin with the size of the company, the

    volume of internet and email use and the size of thecomputer.

    Get the configuration of the bandwidth. This will be adetermining factor with the spam blocking software.

    If email volume and internet usage is high on anaverage day, the spam filter must have the capacity tooperate the large load.

    Consider the foundation of the network and the path ittakes to your network.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    28/71

    27 | P a g e

    The email begins with the internet servers emailsystem, passes through the spam filter.

    If the spam filter deems this clean the email isforwarded to your companys computer network.

    While keeping this in mind, realistically determine thevolume for the filter.

    Staff will send and receive emails from clients andcustomers. The addresses of each contact should be placed

    in the contacts allowed in the browser setting, in the spamfilter and in the address book. Failure to add a client to thislist could result in the correspondence being sent to thespam folder.

    Take into consideration the type of business thecompany deals with. The filter will need to recognize thekeywords pertaining to the company business. Keywordswill need to apply to both incoming and outgoing.

    Set limitations for personal computer use of the companyssystem.

    Blacklist certain sites such as:

    Game sites or Chat rooms

    Limit browsing at random for items such as gifts or

    cars. Allow only a certain amount of time for personal use.Prohibit the receiving and sending of jokes, and massforward emails. Let the staff open these on their personalcomputer. Set a standard for company email sent to clients.

    Make sure each staff member is informed and willing to

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    29/71

    28 | P a g e

    follow these guidelines. The company wants the email sentto their clients, not a spam folder, and they want it to not beavailable to spammers.

    Request your clients follow similar guidelines for thesame reasons. This move will make for safer exchanges.Strive for precise wording in the subject line. This will helpavoid different interpretations of the subject line.

    Comparing and P ricing of Spam BlockingSoftware

    Lets look at the maker and owners of the spam blockingsoftware. Prepare a list of questions tailored to thecompanys needs. Ask for specifics and request they explaintheir response.

    Research

    Determine the features, size, and computer requirements.Can the program be tailored to the companys needs? Willthe software be capable to run properly according to thecompanys email volume?

    Price

    Ask exactly what is included with the quoted price. Inquirespecifically about upgrades and support. Let the seller knowthe company is comparison shopping. Most will be willing tonegotiate a price when the deal is of a sizeable nature.Discuss cost of multiple stand alone personal computers andnetwork computers. Find out if there is a trial program andwhat guarantees are offered.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    30/71

    29 | P a g e

    Support and Upgrades

    Inquire about internal testing of the program. If the supportis to be purchased separately, find out if the coveragepurchased includes the entire program. Determine if thesupport agreement needs to be renewed yearly or if theagreement is for life of ownership.

    Training

    Inquire about onsite training. Be sure to ask if there is alimit to a class and the number of classes. If no onsitetraining available, ask if phone or instant messaging trainingassistance available. Consider sending the group that willoversee the software operation to the manufacturer site ifavailable. Request written manuals, help and tutorial in theprogram.

    References

    Ask for a list of references and actually follow up with thelist. Prepare in advance a few very key questions regardingthe performance, support, and upgrades of the software.

    Dont hesitate to request specifics about the manufacturer.Ask how long they have been in business and how long the

    software has been in the works. Is the manufacturer largewith a large client base?

    Are they listed with the Better Business Bureau? Perform asearch about the software company. Look for alerts orgrievances that might be placed on the FTC website.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    31/71

    30 | P a g e

    Do they list the companys main personnel? How manyemployees are available? The company needs to be assured

    the software company is large enough to handle yourbusiness.

    Comparing and Pricing of SpywareBlocking Software

    This section is very similar to that of spam blockingsoftware; however, for re-enforcement and an easy list torun down, the instructions will be repeated in a manner ofspeaking.

    Lets look at the maker and owners of the spywareblocking software. Just like with the spam blockingsoftware, you should properly prepare a list of questionsmodified to the meet companys needs. Ask for details anddemand they explain their response. This will allow you to

    know whether or not they know what they are doing andwhat they are talking about youll feel much safer by doingthis.

    Research

    Determine the features, size, and computer requirements.Can the program be tailored to the companys needs. Willthe software be capable to run properly according to the

    companys email volume?

    Price

    Ask exactly what is included with the quoted price. Inquirespecifically about upgrades and support. Let the seller know

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    32/71

    31 | P a g e

    the company is comparison shopping. Most will be willing tonegotiate a price when the deal is of a sizeable nature.Discuss cost of multiple stand alone personal computers and

    network computers. Find out if there is a trial program andwhat guarantees are offered.

    Support and Upgrades

    Inquire about internal testing of the program. If the supportis to be purchased separately, find out if the coveragepurchased includes the entire program. Determine if the

    support agreement needs to be renewed yearly or if theagreement is for life of ownership.

    Training

    Inquire about onsite training. Be sure to ask if there is alimit to a class and the number of classes. If no onsitetraining available, ask if phone or instant messaging training

    assistance available. Consider sending the group that willoversee the software operation to the manufacturer site ifavailable. Request written manuals, help and tutorial in theprogram.

    References

    Ask for a list of references and actually follow up with the

    list. Prepare in advance a few very key questions regardingthe performance, support, and upgrades of the software.

    Dont hesitate to request specifics about the manufacturer.Ask how long they have been in business and how long thesoftware has been in the works. Is the manufacturer large

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    33/71

    32 | P a g e

    with a large client base.

    Are they listed with the Better Business Bureau. Perform a

    search about the software company. Look for alerts orgrievances that might be placed on the FTC website.

    Do they list the companys main personnel? How manyemployees are available. The company needs to be assuredthe software company is large enough to handle yourbusiness.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    34/71

    33 | P a g e

    Chapter Five -Relating To Others

    This section details management and delegation ofduties.

    Forgetting the Safeguards

    Now that the anti-Spyware and/or Spam software isinstalled, its time to perform the checks to assure theprogram is running properly to the computer networks

    specifications. Check every individual terminal. Issue newuser accounts, passwords, and separate email accounts.

    Remember the maintenance. Installing a Spam filter isan excellent step; however, thats not the end of it.Management of the software is essential once the spam filterhas been installed just as the constant monitoring andrevamping is needed to keep up with the changes in spammethods. Updating schedules and watch points make

    security more effective.

    In order to stay up to date and keep a lot of stress offof your own shoulders, delegate specific monitoring anddefensive actions to responsible employees.

    Check Points

    Set up a chain of command. Construct a solid plan foremployee training including who, when, where and how.

    1.Have a structure for in house training personnel,support personnel, and application. Designate oneperson or persons who will contact support outside ofthe companys business and make the necessary

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    35/71

    34 | P a g e

    adjustments to the computer.

    2.Instill a concrete training program. Of course, theinitial training will have to be completed swiftly.

    3.Make a schedule so the training will not disrupt theentire company work day.

    4.Once initial training is complete, construct a system ofmini seminars and refresher courses.

    5.Set up specific days to update employees on changesto the program.

    6.Make an orientation program for new hires andreturning work force.

    7.Schedule internal observation sessions so the trainercan evaluate each terminal user. Determine that theemployee can execute and apply his knowledge.

    8.Oversee the establishment of each users email address.Change passwords as recommended earlier in thebook.

    9.Monitor for glitches in the email system. Keep recordsof Spam that slips by the Spam filter. Define andidentify the reasons for the slip. Use this knowledge fortraining and refresher courses.

    10. Monitor the volume of email that the system canhandle without problems. Make sure the computernetworking links properly to each other. Follow up ondisturbances between networks.

    11. Follow up on Spam that finds its way from one

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    36/71

    35 | P a g e

    network terminal to another. Seek support for theseleaks. Make sure each computer network terminal isloaded properly and updates are complete and up to

    date.

    Get Rid of the Sludge Checklist

    Set up systems for data protection. Utilize back-ups and set up restore points. Set up a system to bring the Spam filter up to date

    after restoring.

    Have a contingency program for system failures. Have a firm policy regarding power ups, down loads,

    and shut downs.

    Prepare a regular time to clean registries, browsers,and to defrag.

    Give each employee in the chain of command specificdirections and job descriptions regarding the computersystem and responsibility for spam prevention.

    Take steps to protect valuable information before theproblems actually occur. Its hard to locate informationthat is lost in cyberspace.

    And most importantly, remember, prevention is thebest defense.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    37/71

    36 | P a g e

    Chapter Six - More Guards andOptions for Spam

    Its time to deal with the different types of spam andprograms. This means how they will be delivered andutilized as filtering software. General users on personalcomputers would most probably download a free orinexpensive software blocking system. A company cantafford to pick just any old software and download theprogram. There are other methods of spam and blockingprograms to install or use.

    ASP or Application Service Provider

    In this system, email goes through the ASP first andthen it is forwarded to the company. Your company willestablish with the ASP the perimeters such as the type ofbusiness it deals in and keywords, senders and receivers,etc. The ASP will have a format, which will be completed

    and then uses this format to forward emails to the companyand send the spam to the junk pile. The pitfall to thesystem, theres not much - if any - opportunity to inspectthe spam folder for mistakes.

    Lets take a look at some of the benefits:

    The Company will not need to change settings andformat to its system.

    Less opportunity to mess up and create chaos in thecompany computer infrastructure.

    Less likely to lose service in event of major event suchas a damaging tornado.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    38/71

    37 | P a g e

    Reduction of liability if Companys format is capturedand forwarded to others. This is unlikely since the

    Company directory will not be directly available.

    Reduction of employee time dealing with spam, orspending dealing with support personnel.

    Less time spent with software management likeupgrades and changes in spammers ever-changingattack techniques.

    Less space used on the Company computer since theASP will carry the program.

    Spam and Blocking P rograms

    The next spam prevention method to discuss is thespam and blocking programs.

    This type of system is generally what the user typicallyconsiders as the only choice available. Of course, this hasalready proved otherwise. The purchase of a softwareprogram is not necessarily the only way to add or usefeatures such as protection programs. By the way, otheruseful programs can be obtained for use without purchasingbut that would be an entire other book.

    Some information on spam and blocking programs:

    Puts the Company in the drivers seat. Email cant be read by a third party administrator. Manage frequent changes such as whitelist, blacklist, or

    keywords in house.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    39/71

    38 | P a g e

    Manages updates, policy, and support in house. The Company uses space on its system. The Company is responsible for setting the controls,

    safety features, and directories.

    Monitors Spam and Directory attacks in house. Knows and manages its employees, their use and their

    location. Unlike ASP, you might not be apprised of the

    location or true owner.

    External Hardware

    Next on the list of Spam and managers is the ExternalHardware. The external hardware closely resembles the ASPin the aspect that the email goes through the externalhardware then to the main system. One big difference, the

    company owns the hardware, the software, and stays inhouse.

    Lets take a look at some info on external hardware:

    Basically, the spam and program independent of themain computer network.

    Not much in the way of changing the main computeroperating system. Meaningless tragedy andbreakdown. Less potential to directory attack. Totalloss if Tornado strikes particular area.

    Control settings, blacklist, white list, or keywords areleft to the Company.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    40/71

    39 | P a g e

    Company is responsible for managing updates, patches,and support needs.

    Overall, less employee time dealing with Spam. Morethan would be with an ASP, less than the software.

    Not much data space available.

    Preset Spam Blocking Program

    The last selection is the installation of a preset Spamblocking program.

    Installed on each and every terminal. Works independent of each other. Each user manages each aspect of filtering, updates

    and support.

    Little control over settings to system. Little control over keywords, white list, or blacklist. Usually checkbook friendly. Usually downloaded.

    As in every business decision, there are benefits andrisks to consider. When choosing a Spam Blocking Option,the Company must weigh the Risks verses the Benefits. Itgoes without saying; the choice made will have a hugeimpact on the Company computer network.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    41/71

    40 | P a g e

    Chapter Seven More Guards and Options

    for Spyware

    Now, its time to deal with the different types ofSpyware programs. This means how they will be deliveredand utilized as filtering software. General users on personalcomputers would most probably download a free orinexpensive software blocking system. A company cantafford to pick just any old software and download theprogram. There are other methods of Spyware blockingprograms to install or use. These are normally paired withthe Spam blocking program, but can, and in many companyprofiles, should be separate.

    Although the guards for spyware are very similar to that ofthe spam, we will re-enforce this information and an easy touse list. The instructions will be repeated in a manner ofspeaking.

    ASP or Application Service Provider

    In this system, email goes through the ASP first, thenforwarded to the company. Your company will establishwith the ASP the perimeters such as they type of business itdeals in and key words, senders and receivers, etc. The ASPwill have a format which will be completed and then usesthis format to forward emails to the company and send the

    Spyware to the junk pile. The pitfall to the system, theresnot much - if any - opportunity to inspect the Spyware folderfor mistakes. This is a solution where the Spam andSpyware program would be included within the samecoverage as a paired program.

    The Company will not need to change settings and

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    42/71

    41 | P a g e

    format to its system.

    Less opportunity to mess up and create chaos in thecompany computer infrastructure.

    Less likely to lose service in event of major event suchas a damaging tornado.

    Reduction of liability if Companys format is capturedand forwarded to others. This is unlikely since theCompany directory will not be directly available.

    Reduction of employee time dealing with Spyware, orspending dealing with support personnel.

    Less time spent with software management likeupgrades and changes in Spammers and Spywareprograms ever-changing attack techniques.

    Less space used on the Company computer since theASP will carry the program.

    Spyware Blocking Programs

    This type of system is generally what the user typicallyconsiders as the only choice available. Of course this hasalready proved otherwise. The purchase of a softwareprogram is not necessarily the only way to add or usefeatures such as protection programs. By the way, other

    useful programs can be obtained for use without purchasingbut this is another book.Spyware Blocking Programs:

    Puts the Company in the drivers seat.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    43/71

    42 | P a g e

    Email cant be read by a third party administrator.Manage frequent changes such as white list, blacklist,or keywords in house.

    Manages updates, policy, and support in house. The Company uses space on its own system. The Company is responsible for setting the controls,

    safety features, and directory safeguards.

    Monitors Spyware and Directory attacks in house. Knows and manages its employees, their use and their

    location. Unlike ASP, you might not be apprised of thelocation or true owner.

    External Hardware

    Next on the list of spyware and managers is the ExternalHardware. Closely resembles the ASP in the aspect that theemail goes through the external hardware then to the mainsystem. One big difference, the Company owns thehardware, the software, and stays in house. Another onethat would most probably be paired with the Spamprotection.

    Lets take a more detailed look into the world of the external

    hardware in the aspect of spyware protection:

    Basically, the spyware and program are independent ofthe main computer network.

    Not much in the way of changing the main computer

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    44/71

    43 | P a g e

    operating system. This means less tragedy andbreakdown. Less potential to directory attack. Totalloss if Tornado strikes particular area.

    Control settings, blacklist, white list, or keywords areleft to the Company.

    Company is responsible for managing updates, patches,and support needs.

    Overall, less employee time dealing with Spyware. Morethan would be with an ASP, less than the software.

    Not much data space available.

    Spyware Blocking Programs

    The last selection is the installation of a preset Spywareblocking program.

    Installed on each and every terminal. Works independent of each other. Each user manages each aspect of filtering, updates

    and support.

    Little control over settings to system. Little control over keywords, white list, or blacklist. Usually checkbook friendly. Usually downloaded.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    45/71

    44 | P a g e

    Spam protection helps with many helpful and necessarymatters like time, and the bottom line. Spyware protection

    does the same, but in the same way provides even morevaluable protection. Choosing the manner in which theprotection is supplied results in another choice.

    Do you want this protection in one location or in severallocations? The answer to this depends on the followingconsiderations:

    The size of the company. The location of the company. The nature of business. Number of Employees available to oversee the entire

    network.

    Internal support and recovery personnel available. Amount of company dollars available.

    A company whose primary business deals withextremely sensitive issues would benefit from one centralarea. In the same sense, individual stations with individualprotection might be just as beneficial. Two aspects of thesame solution.

    As in every business decision, there are benefits andrisks to consider. When choosing spyware protectionoptions, the Company must weigh the Risks verses theBenefits. It goes without saying; the choice made will havea huge impact on the Company computer network.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    46/71

    45 | P a g e

    Chapter Eight Solving Differences

    Specific Employee Training & Harmony

    Face it, not many employees LIKE the idea ofmandatory training seminars. Even fewer like the idea ofnew employee orientation. In like industries, orientationtends to be very similar with only a few minor differences.The exception in this case is the Spam and Spyware blockingprogram used from company to company, regardless of how

    similar they are in nature. There are companies whose workis so sensitive that the software programs will vary fromarea to area.

    Obviously, the training of this software is of utmostimportance. The security of the company is dependent onthis. The security of customers is at risk with pooroperation. The company is at a liability without theprotection. Loss time and productivity is at risk with

    inadequate performance.

    Overall, take into focus the training needed. When themajority of the personnel to be trained feel the computer isnot so friendly, then the training needs to cater to thisparticular group. On the other hand, if the users arecomputer literate genius and really savvy, dont treat themlike first graders. Before developing ANY training program,consider the audience. Failure to do so results in failure.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    47/71

    46 | P a g e

    Group and I ndividual Training

    Nearly everyone can be taught to use most anysoftware program with the proper hands-on training. Grouptraining is more time effective; however, it definitelyrequires more physical equipment at one sitting. This isusually an effective method when the group is of mixedexperience or the instructor isnt sure in advance of thegroup experience.

    Lets take a look at how this can adequately be performed:

    Preparation:

    Know the material that needs to be taught. Outline the facts and check the accuracy. Have handouts, class tools such as pen and paper

    separated and ready to hand out, pick up, or on eachseat.

    Make sure computers are up and running properly. Plan in advance for breaks, questions, and practice.

    Delivery:

    Remember a simple rule for speaking:o Start by giving a brief overview with what will be

    discussed.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    48/71

    47 | P a g e

    o Discuss the subject. (Teach the class)o End with a brief review of what was discussed.

    Remember your audience. Speak precisely and clearly. Keep the class flowing smoothly. Use overheads to bring teaching into focus. Stick to the time format. Dont get off the subject. Dont ramble.

    Practice:

    Give the allowed time to practice. Dont put practice aside for any reason. Schedule ample time for practice. Have enough tutors to help with practice. Offer guides that help with the hands on practice.

    General Points to Ponder:

    Dont make fun or make light of someones lack of

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    49/71

    48 | P a g e

    understanding.

    Be willing to repeat when necessary. Keep things friendly. Dont be harsh, condescending, or too smart Be professional. Show Confidence. Dont tell a joke if you cant tell a joke Be calm. Be direct. Be in charge of the class not the other way around. Start on Time. End on Time.

    Handbooks:

    Handbooks are not the greatest tool for every user;however, they are an excellent tool to issue alongside verbal

    and hands-on teaching. This goes back to knowing youraudience. Techies can take a handbook and sail rightalong. The less than average computer user will probablyget more benefit from hands-on with the handbook to goalong with the classroom training.

    More often than not, people will need the visual clues

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    50/71

    49 | P a g e

    and the handbook. Handbooks are most helpful to mostusers as a reference guide after learning. Its somethingthey can go back to should a question arise at a later time

    after the initial training.

    Try to include hands-on practice and the handbook forusers to keep. The company will benefit from the trainingand references made available to its employees.

    Attempt to format the handbook in a simple, easy tofollow way. Keep instructions with instructions. Putdefinitions at the beginning of each section, or in a

    dictionary format at the end or even both. Be sure to startwith a table of contents for the ease of finding specificissues.

    Techies would probably rather flip to the specific sectionthey need help with rather than reading the entire handbookfrom the beginning to end. Newbies would rather read fromthe beginning to the end and be able to understand whatthey are reading; hence, the use of definitions.

    Its important that everyone wins so that your companycan be properly protected as well as your customers.

    After Training - Getting Ready to Drive

    At this point, the software program has been selected.The training has been completed. The computer is up and

    waiting. With all things in place, what could possibly be leftto organize? Well, maybe the actual installing of the Spamand Software Program.

    Most casual users would just pick the first programthey came across and download it. Disaster is waiting to

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    51/71

    50 | P a g e

    happen with this method. A disaster a company absolutelycannot afford to let happen. Careful planning of theprogram installation is as important as the program itself.

    Lets take a look at a quick mapping of this process:

    Map out the schedule to install. Select the most vulnerable stations first. Select a time that will not interfere with company

    operations.

    Notify each department head. Double check that everyone concerned is on board. Begin with the installation on a small percentage of

    terminals.

    Run a test on the terminals after installation. Once all kinks are worked through, proceed with the

    install schedule.

    During the installation, its necessary to have people onboard that can help to work through the kinks. Also, havethe personnel available to offer touch-up training to calmlast minute jitters and clear any confusion not addressedpreviously.

    Remember when preparing the installation; notifycustomers that there may be a down time. Customers andclients need to be alerted of this information and know whoand how to contact during this time period. Otherwise, youcould lose customers and clients during this process.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    52/71

    51 | P a g e

    Troubleshooting, staggered schedule, support ortraining personnel and the legal eagles will help make this

    transition smoother. There cant be enough planning orassistance when first starting the use of anti-spam or anti-spyware software. Make less trouble for your employeesand in return, you will receive less trouble. Preparation isessential here.

    People Helping People

    Run time, practice, training; all good points to consider.Make a list of people needed to get the project off andrunning.

    Boards, owners, and the bank are usually the firstpeople to approach with any project. Ideas are great, butgenerally speaking, require money.

    Outline the program desired. Detail the need. Be sure to include statistics. Detail the benefits. Show the costs including training Create a sense of the cost without a program Invite everyone needed:

    o Administratorso Bank

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    53/71

    52 | P a g e

    o Board of Directorso Legal Counsel

    Once the details are complete, use the time to alsoinclude a demonstration for everyone.

    Discuss the initiation of the Spam and Spywareblocking program with your clients and customers. Let themknow there will be some changes, when to expect thesechanges, and how it will affect their business with you.Consider a test run sending and receiving emails from each.

    The reason for this is to ensure the smoothness of theinstallation and to be sure their system is compatible withyours.

    Have the legal eagles prepare a letter or statement inadvance. Why?

    o In case the first runs are not so smooth.o In case their emails get blocked, and in case the

    company mail gets scrapped.

    Understanding is one thing, throwing a wrench into thespokes is quite another.

    Another major consideration for legal assistance wouldbe the possibility of slowing down required business or sales.Timelines and deadlines could be of major importance with

    the companys business and are of utmost importance.

    Legal eagles will have to read, adjust, and approve thecontracts with the provider of the software. There mightneed to be contracts with customers and clients separately.Contract personnel and outside contracts will need to be

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    54/71

    53 | P a g e

    revised for appropriateness as well.

    Finally, company protection from employees is an

    important consideration in this process. What happens if theemployees refuse to follow along with the program? Therewill have to be changes with the company policy andprocedures. There will have to be legal determinations withnoncompliance in writing.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    55/71

    54 | P a g e

    Chapter Nine - Mapping Samples

    The Spam software is installed; the employees have beentrained; now, its time for the real test.

    Test the Spam

    What is the real test? The real test is the everyday useof the program with the everyday employees that will usethe program. The real test will be to see just how muchspam is captured incoming and how much is prevented from

    being sent. This is really the part where you want to takenotice of the actual workings of the anti-spam software.

    Remember earlier, it was recommended to updateimmediately? Thats the first thing to be done. After aprogram is developed and placed on the market, spammersare working to find more and more ways to sneak through.Also, the developers have worked to repair any glitches afterthe installation by the consumers. Obviously, these issues

    are not a part of the original software. Update the systemon each and every terminal very important!

    The next task would be to run a full scan. Perform thescan on each and every terminal once again, veryimportant! Take note of all the spam and adwarediscovered. Then, the user should look at the vault orquarantine program.

    The following will give detailed measures to test andmonitor the software. Testing information can be used formore than one purpose.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    56/71

    55 | P a g e

    Organize the Test Data

    Test Log Data. This should include differentmeasurable data findings:

    Day, Date, Time of Update Day, Date, Time of Each Scan. Specifics about Spam found in vault Specifics about email that should NOT be in the vault Length of Scan Glitches in scanning:

    o Includes program issueso Computer system issueso Employee operation issues

    Glitches in Updating Software:

    o Includes program issueso Computer system issueso Employee operation issues

    Glitches in day to day operations:o Includes program issueso Computer system issueso Employee operation issues

    Calls to In House Support:o Includes nature of issueso Response to the issueso Final outcome

    Record of Software Support Contact:o Includes nature of issues

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    57/71

    56 | P a g e

    o Includes Response to Issueso Final outcome

    Evaluation and comments

    Making Use of the Evaluation

    This log should be done on a regularly scheduled basis.Make sure these evaluations are performed and occasionallyperform an unscheduled scan.

    After the initial installation, be sure to perform theseevaluations much more often.

    Have printed material at each terminal so each usercan record day to day problems or concerns. Look for thefollowing:

    Compare and Tally results of evaluation. Is there a pattern noted? Is a particular time more vulnerable to spam than

    others?

    Examine web sites visited.o Determine whether Spam is found more often

    after a site is visited.

    Is the software sending too many needed emails to thevault?

    o Examine the keywords and program specifications.o Relax the rules and specifications for incoming

    email.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    58/71

    57 | P a g e

    Is the program allowing too much Spam to go out?o Examine the keywords and program specifications.o Restructure the rules and specifications for

    outgoing email.

    What response is the in house support staff giving?o Are the problems being resolved?o Does it indicate further employee training is

    needed?o Is support easily accessible?

    What response is the software support staff giving?o Are the problems being resolved?o Does it indicate further employee training neededo Is the support easily accessible?

    The evaluation log helps to see how effective the spamsoftware program is for the company. The tally sheet also isa useful tool to present to the Board of Directors, Owners,

    Financers as well as excellent orientation tools. This toolcan be extremely effective for use by the company.

    Spam Testing For Real

    The spam blocking program is installed and running.Day to day operations are rolling right along. Its time to

    use the evaluation log for real test runs.

    Schedule specific times for checking the software program inaction and thoroughly follow through with the scans.

    Set these scan checks for various timesduring a working day.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    59/71

    58 | P a g e

    Set the scan checks for different days ofthe week and different days of the month,

    etc.

    Set at least one scan close to a day whenmany are paid such as the first when mostgovernment employees are paid.

    Schedule a scan around a holiday period, such asChristmas

    Select two secure terminals within the company to runthe first real test. Select several different terminals withinthe company for regularly scheduled test scans. Thisprotects spam from delivery to customers and clients.

    Send a sample of regular type email that is usuallyreceived and comparable in volume per terminal.

    Send a sample a sample of regular email usually sentalso with a comparable volume per terminal.

    Submit a small number of emails with obvious spam. Submit a small number of emails with the not so

    obvious spam. Increase the volume of each of these examples and

    then overload the volume of emails.

    Examine the vault for missed emails which should havebeen received.

    Examine the vault for dumping after each volume. Check updates to ensure they were installed or just

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    60/71

    59 | P a g e

    downloaded.

    Refine keywords, white lists and software specifics asneeded according to the percentage of forwarded spamand captured email that should be acceptable.

    Spies among Us

    Next, test the effectiveness of the Spyware blockingProgram. The overall testing of the Spyware is similar forthe most part to testing of the Spam blocking program.

    However, for re-enforcement and an easy list to run down,the instructions will be repeated in a manner of speaking.The Spyware blocking program must be working and usable.The company is at risk when Spyware sneaks in the backdoor. Since its not so easy to see and spot until its too late,real and extensive damage can occur until it is secluded andhealed.

    Remember earlier it was recommended to update

    immediately? With the Spyware blocking program, thatsthe first thing to be done also. After a program is developedand placed on the market thieves are working to find moreand more ways to sneak through. Also, the developers haveworked to repair any glitches after installation by theconsumers. Obviously, these issues are not a part of theoriginal software. Update the system on each and everyterminal as this is very essential in staying up to date.

    The next task would be to run a full scan. Perform thescan on each and every terminal. Take note of all the spyware and tracking cookies placed for cleaning. Then, theuser should look at the vault or quarantine program. Likespam, the offenders are sent here, but are not necessarilydealt with in the same manner. Depending where the threat

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    61/71

    60 | P a g e

    is found will determine the action the software program willtake.

    The following will give detailed measures to test andmonitor the software.

    Organize the Test Data

    Test Log Data. This should include differentmeasurable data findings:

    Day, Date, Time of Update. Day, Date, Time of Each Scan. Specifics about spyware found in vault. Specifics about email that should NOT be in the vault. Length of the Scan. Glitches in scanning:

    o Includes program issueso Computer system issueso Employee operation issues

    Glitches in Updating Software:o Includes program issueso Computer system issueso Employee operation issues

    Glitches in day to day operations:o Includes program issueso Computer system issueso Employee operation issues

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    62/71

    61 | P a g e

    Calls to In House Support:o Includes nature of issueso Response to the issueso Final outcome

    Record of Software Support Contact:o Includes nature of issueso Includes Response to Issueso Final outcome

    Evaluation and comments

    Making Use of the Evaluation

    This log should be done on a regularly scheduled basis.Make sure these evaluations are performed and occasionallyperform an unscheduled scan.

    After the initial installation, perform these evaluationsmuch more often.

    Have printed material at each terminal so user canrecord day to day problems or concerns. Look for thefollowing:

    Compare and Tally results of evaluation. Is there a pattern noted? Is a particular time more vulnerable to threats and

    invasion than others?

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    63/71

    62 | P a g e

    Examine web sites visited.o Determine whether Spyware threats are found

    more often after certain sites are visited.

    Is the computer system running smoothly withoutslowdown or shutdown?

    Is the Spyware program preventing entry to neededsites?

    Can the user operate as usual such as downloadingnecessary files or shared files?

    What about sending files or uploading?o Will the Spyware Program allow the user to send

    out properly?

    What response is the in house support staff giving?o Are the problems being resolved?o Does it indicate further employee training is

    needed?o Is support easily accessible?

    What response is the software support staff giving?o Are the problems being resolved?o Does it indicate further employee training is

    needed?o Is the support easily accessible?

    The evaluation log helps to see how effective thespyware software program is for the company. The tallysheet also is a useful tool to present to the Board ofDirectors, Owners, Financers as well as for orientation tools.This tool can be extremely effective for use by the company.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    64/71

    63 | P a g e

    Spy Hunt

    The Spyware blocking program is installed and running.Day to day operations are rolling right along. Its time touse the evaluation log for real test runs.

    Schedule specific times for checking the softwareprogram in action and thoroughly follow through with thescans.

    Set these scan checks for various timesduring a working day.

    Set the scan checks for different days ofthe week and different days of the month,etc.

    Set at least one scan close to a day whenmany are paid such as the first when most

    government employees are paid.

    Schedule a scan around a holiday period, such asChristmas

    Select two secure terminals within the company to runthe first real test. Select several different terminals withinthe company for regularly scheduled test scans. Thisprotects spam from delivery to customers and clients.

    Use a sample of regular type files and downloads thatis usually received and comparable in volume perterminal.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    65/71

    64 | P a g e

    Take samples a regular uploads and sites usually sentand visited. This also should be used with acomparable volume per terminal.

    Submit a small number of downloads, sites, or uploadswith obvious Spyware Threats.

    Submit a small number of files, downloads, uploads orsites with the not so obvious Spyware Threats.

    Increase the volume of each of these examples, thenoverload the volume of threats.

    Examine the vault for missed files and downloads,which should have been received.

    Examine the vault for dumping after each volume. Check updates to ensure they were installed or just

    downloaded.

    Refine keywords, white lists and software specifics asneeded according to the percentage of Spyware threatsfound

    After one scan is completed, run the scan again just tocheck the amount not cleaned on the first pass.

    o Does the program run smoothly or is it slow andsluggish?

    o Does the program freeze frequently?

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    66/71

    65 | P a g e

    Chapter Ten Technical Realm

    Day to Day Stuff

    Everyday details are necessary. In this case, dailymaintenance may not be necessary, but regularmaintenance is most definitely a necessity. Start with thetop.

    Spam Filters and Settings:

    Evaluate the setting regularly. Reset keywords. Examine the increase in spam received. Examine the increase of good email sent to vault. Scan directories.

    Add program software maintenance to the regulardefrag and browser maintenance schedule. This will helpthe entire system run more effectively and efficiently.

    Vaults or Quarantine:

    Some programs have vaults, while some have quarantines.Its practically the same exact thing, just a different name.

    Check the size of the program regularly Check frequently the contents of the vault Set alerts to notify when the vault is getting full.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    67/71

    66 | P a g e

    Check for reasons vault is not getting fullThe size of a quarantine folder or vault has various

    indications. For instance: the larger the folder, the morespace that is used.

    Other stories are told by the folder. If the size isincreasing quickly, then the filter settings need to berelaxed. When this happens, more of the good stuff isgetting dumped into the spam folder. This will require morefrequent examination of the contents to retrieve what is

    needed. This results in a reduction of efficiency as well asrevenue - a good reason to check the contents frequently.

    Another factor for the size of the vault would beautomatic cleaning or dumping. Have you ever lostsomething because the browser was too full or the memorywas full? When the folder is full, it simply cant hold anymore. It overflows. This results in permanent loss of thecontents. While this might be preferred when speaking of

    spam, what about the good stuff? The preferable email islost right along with the spam. Not a good thing. Of course,the folder can be emptied manually; however, it is easier toempty it on a regular basis. A setting can be applied to alertthe user when the folder is getting close to being full.

    What do you do when a folder is not filling on a not-so-regular basis? This means not too quickly. It means thatthe settings need to be examined to increase its

    effectiveness. Its more likely that the settings are lacking inperformance than it is there is less spam being sent to themailbox. Examine and update the white list. Customers andclients change names, new ones are added, products areadded and so forth and so on. As these changes occur, thelist needs to be changed as well. After all, protecting the

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    68/71

    67 | P a g e

    company client base is one of the major reasons forinstalling the program.

    The last maintenance tool that will be discussed here isupdates. Remember earlier in the book, it wasrecommended to update immediately after installing.

    The reason that updates are so essential is thatbecause after the software is developed and put intoproduction, changes in spam and spyware methods havealready improved. The weasels get better and better. Thedevelopers have to accommodate for these new methods.

    Also, after consumers begin to use the program,glitches can appear. The developer has to repair theseglitches. The developers configure their own patch. Thistakes us to operating system updates and patches. Onceagain, the developers have to update their software to keepup with these changes.

    Updates are as essential to the software as the

    software is to the company that uses the program. Withoutthe updates, the user is left wide open without protection.Might as well and put an ad in the paper that reads,

    Failing to update would make about as much sense.

    W anted: Spammers and Spywareto attack my business.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    69/71

    68 | P a g e

    Conclusion

    Review of Systems

    Each section of this tutorial deals with different aspectsof spam prevention then spyware protection. The book wasdesigned to take the company owner slowly through thedecision and selection process. In hopes that the wordingand meaning is clear and understandable, the companyofficial or owner will take this knowledge to help their

    company and employees.

    Spam and Spyware is a time consuming and costlyconcern. Why do you need to be properly protected?

    Employees are overburdened with the mountains ofspam which flows into the mailbox.

    Productivity is slowed because the user has to siftthrough all the email to look for legitimatecorrespondence.

    Clients and customer business is at risk because thissame legitimate email is accidentally deleted.

    Unpleasant and costly legal consequences can arisewhen spam is inadvertently forwarded.

    Employees are embarrassed and insulted with intrusive,obnoxious pornography that is included with muchspam emails.

    Police investigation and possibly arrests can occur frominadvertently forwarded pornography emails.

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    70/71

    69 | P a g e

    Employees are lured to sites and are not taking care ofcompany business.

    Computer systems can be frozen, crashed, andprograms disabled from hidden spyware threats.

    Sensitive company information can be obtained fromspyware threats.

    Passwords and banking account information can beretrieved with spyware methods.

    Threatening and non-friendly tracking cookies tell thecat burglar where, when, and how the user worksletting the thief know when, where, and how to strike.

    Legal liability and costly legal action as a result ofspyware sent through employee and companycomputers.

    The adverse consequences from spam and spywarethreats can go on and on again. The originators of spamand spyware constantly think of and devise newer andcleverer methods to try and lure individuals and companiesout of their money. These con-artists and thieves are herefor one main reason and that is to get money. Your money.Your company dollars. A few of these misguided attackersjust want to cause havoc with the company computersystem for no reason other than the fact that they can.

    Each section of this book slowly builds and explainshow to select, manage, and operate spam and spywareblocking applications. Checklists and step-by-stepconsiderations are provided for use. These steps andchecklists can be used as is or tailored to fit your

  • 8/9/2019 Protect Yourself From Spam and Spyware for Newbies

    71/71

    companys needs.

    Since it is apparent that spamming and spyware will

    not be stopped, efforts to stop them from damaging yourcompany are required. This hopes to help the company dojust that: stop damaging threats, thefts and energy drainingmethods out of your company. This hopes to help thecompany fight the enemy and put them behind closed doors.Outside the company doors. Outside the company playyard. Out of your hair!