{"id":15074,"date":"2015-06-23T19:47:37","date_gmt":"2015-06-23T19:47:37","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=4101"},"modified":"2021-08-06T07:08:27","modified_gmt":"2021-08-06T11:08:27","slug":"antispam-technologies-secure-mail-for-people-and-business","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/antispam-technologies-secure-mail-for-people-and-business\/15074\/","title":{"rendered":"Antispam technologies: secure mail for people and business"},"content":{"rendered":"<p><strong>Problems with unwanted mail<\/strong><\/p>\n<p>It is difficult to find an email user who has never received any kind of spam. Some get mail from dubious correspondents in their inboxes from time to time, and others have to purge hundreds of those messages every day. Mass mailing is a serious problem not just because it consumes time and physical resources for the process of sorting emails, but also because they are a\u00a0frequent source of malicious content. One infamous example of cyberweapons \u2013 <a href=\"https:\/\/securelist.com\/duqu-faq-33\/32463\/\" target=\"_blank\" rel=\"noopener\">Duqu<\/a> Trojan \u2013 infects systems after an apparently harmless text document has been opened, thereby exploiting a vulnerable system. Moreover, attackers actively use the so-called spearphishing method (targeted mailing with a fake sender\u2019s address to a specific list of email addresses) to penetrate the targeted organization\u2019s infrastructure. This sort of an attack was implemented in the APT \u201c<a href=\"https:\/\/business.kaspersky.com\/deny-the-hellsing-apt-by-default\/3851\" target=\"_blank\" rel=\"noopener nofollow\">Hellsing<\/a>\u201c, when cybercriminals delivered malware via targeted emails with attachments.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Antispam technologies: secure mail for people and business<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fo5uG&amp;text=%23Antispam+technologies%3A+secure+mail+for+people+and+business\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>It\u2019s no wonder\u00a0attackers use spam as a means of distributing malware, which is attached to the message body. Spam messages may contain links to malicious web resources, which are the starting points for phishing or contain malicious code. After making it to the \u201cInbox\u201d the letter may become an entry way for a spying Trojan that steals valuable data or an encrypting ransomware which demands money for decoding necessary files. In the case of a Trojan encryptor getting into a workstation, it is not just personal user files that are exposed, but also the working data, and eventually the business process is damaged.<\/p>\n<p>According to a\u00a0<a href=\"http:\/\/media.kaspersky.com\/en\/IT_Security_Risks_Survey_2014_Global_report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">B2B International 2014 Survey<\/a>, spam has become the primary threat among other external threats to the corporate sector. 64% of all respondents defined spam as most dangerous to their IT-infrastructure.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/06\/06020334\/Antispamwide-1.png\"><img decoding=\"async\" class=\"aligncenter wp-image-4103 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/06\/06020334\/Antispamwide-1.png\" alt=\"Antispamwide\" width=\"1024\" height=\"677\"><\/a><\/p>\n<p>Attackers improve social engineering techniques, which are then used in the preparation of the malicious message. For example, Kaspersky Lab\u2019s experts detect an increase of messages containing malicious attachments disguised as various financial documents: notifications of fines, remittances, unpaid bills, payments, orders and complaints, e-tickets, etc. Among these fraudulent notifications there are also fake messages on behalf of public services, shopping malls, booking services, airlines and other well known organizations. These deceiving techniques urge users to read the message and open malicious attachments or follow a malicious link in the message body.<\/p>\n<p>Furthermore, Kaspersky Lab\u2019s experts found that the proportion of spam in March 2015 amounted to 56.17% of the total email traffic. At the same time, the monthly share of spam in email traffic shows that malicious activity waxes on holidays and vacations. Given these facts and the ingenuity of fraudsters, one must implement available technologies to effectively counter this threat.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-4106\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/06\/06020333\/Spam-report_Q1-2015_16-1.jpg\" alt=\"Spam-report_Q1-2015_16\" width=\"800\" height=\"511\"><\/p>\n<p style=\"text-align: center\"><em>The percentage of spam in email traffic (October 2014 \u2013 March 2015)<\/em><\/p>\n<p>Email is still of great importance for corporate infrastructure communication. However, one should understand that cloud email clients have generated an additional source of troubles for IT-infrastructure, because now an employee has access not just to the corporate mail, but to his or her personal correspondence, too, which also needs to be protected against spam. Therefore, fighting unwanted and often dangerous correspondence is a must for <a href=\"https:\/\/securelist.com\/blog\/software\/69887\/how-to-mitigate-85-of-threats-with-only-four-strategies\/\" target=\"_blank\" rel=\"noopener\">comprehensive protection<\/a> of infrastructure and requires solutions which are based on effective antispam technologies.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The proportion of #spam in March 2015 amounted to 56.17% of the total email traffic.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fo5uG&amp;text=The+proportion+of+%23spam+in+March+2015+amounted+to+56.17%25+of+the+total+email+traffic.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><strong>The methods of keeping your \u201cInbox\u201d tidy<\/strong><\/p>\n<ul>\n<li>To successfully counter the ceaseless stream of junk mail we suggest you follow a few simple rules:<\/li>\n<li>Create two email accounts \u2013 one public and another corporate. Use the latter address exclusively for business correspondence with familiar people. Under no circumstances open attachments until you are sure of their safety.<\/li>\n<li>Do not reuse the same password for both email accounts \u2013 it will help avoid trouble if cybercriminals with\u00a0access to your personal correspondence are able to compromise your corporate email, and vice versa.<\/li>\n<li>Never publish your corporate email on the Internet or use it to register on web resources \u2013 the second public address is good enough for that.<\/li>\n<li>In the case of spam or messages from unknown persons in your Inbox, do not open attachments or follow links. Don\u2019t bother to respond to such letters either.<\/li>\n<li>Enable security solutions providing advanced technology to combat spam.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Fighting unwanted and often dangerous correspondence is a must for comprehensive protection of infrastructure and requires solutions which are based on effective antispam technologies.<\/p>\n","protected":false},"author":345,"featured_media":15652,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2318,240],"class_list":{"0":"post-15074","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-antispam","10":"tag-spam"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/antispam-technologies-secure-mail-for-people-and-business\/15074\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/antispam-technologies-secure-mail-for-people-and-business\/15074\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/antispam-technologies-secure-mail-for-people-and-business\/15074\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/antispam\/","name":"antispam"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/345"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15074"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15074\/revisions"}],"predecessor-version":[{"id":41070,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15074\/revisions\/41070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15652"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}