TITLE

CleanUp

PUB. DATE
May 2001
SOURCE
Logistics & Transport Focus;May2001, Vol. 3 Issue 4, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The many security and management issues raised by electronic mail are discussed in this report. The first is one's simple reliance on it. So, the first challenge of electronic mail is to make sure that one must permanently stay online and, for that, one needs a back-up Internet Service Provider and a high availability solution. Another major area of threat is what comes into one's network through electronic mail. Simple overuse of electronic mail is one of the potential causes of performance problems. Attachments are another performance issue. Unsolicited commercial messages, known as spam, is another major issue. A number of security issues are raised in connection with outgoing electronic mail. One of these is companies laying themselves open to legal action because of something said in electronic mails by employees. Another problematic area is that of business sensitive information being mailed out to competitors. An unintentional, but potentially damaging, threat is sending electronic mail to the wrong recipient.
ACCESSION #
11944587

 

Related Articles

  • Spy Mail. Nickson, Stephen // Risk Management (00355593);Feb2001, Vol. 48 Issue 2, p6 

    This article reports that the application of a feature common to the latest electronic mail programs, one can learn, undetected, whether or not the people he or she send electronic mails to are opening the messages. With a service found on the Internet, one can tell precisely when a recipient...

  • China To Fight Spam.  // Database & Network Journal;Aug2005, Vol. 35 Issue 4, p22 

    This article reports that the Beijing, China government has joined the international efforts to fight spam, by adopting the London Action Plan on Spam Enforcement Collaboration. Following months of discussions, China has agreed to sign up to the plan which will mean greater cooperation between...

  • Email Troubles and Online Usage formulating a policy for your company. Connolly, Tony // Accountancy Ireland;Aug2005, Vol. 37 Issue 4, p77 

    Provides pointers to managers in Ireland in implementing a formal electronic online and email usage policy. Use of the policy to guide users of their rights and responsibilities when using electronic and online systems; Need to appoint a computer security officer to carry out the policy; Issues...

  • Getting the Message.  // Information Security;Feb2006, Vol. 9 Issue 2, p30 

    Highlights the IronMail e-mail security system from CipherTrust. Product quality; Performance capabilities; Efforts of the company to protect e-mail data from unauthorized activities.

  • Infosecurity Europe 2006: Risky Business - The Self Auditing Database.  // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p11 

    The article focuses on false assumptions in the use of built-in auditing tools supplied with database software platforms for the protection of sensitive data. These include the belief that the audit tool is the only element in the database that is not vulnerable to attacks and the notion that...

  • Tip of the week 1: E-mail privacy. Kendall, Nigel // GP: General Practitioner;11/10/2003, p45 

    To maintain electronic mail (e-mail) privacy, always use the blind carbon copy (BCC) option to avoid sharing addresses. The BCC option is available in all e-mail clients, albeit sometimes hidden. It is named after the old fashioned blind carbon copy and means that only the sender will be able to...

  • Standing Up to Spam.  // PM Network;Sep2004, Vol. 18 Issue 9, p6 

    Focuses on the efforts of business enterprises to deal with the problem of unsolicited electronic messages. Opinion of some experts that the problem can be considered a serious; Percentage of customer e-mails considered spam according to Internet security firm MessageLabs of Gloucester,...

  • Chapter 3: I Just HATE it When that Happens! Updergrove, Andy // Standards Today;Sep2010, Vol. 9 Issue 3, p30 

    The article discusses the chapter three of The Alexandria Project. It explores a day in the office when a subordinate was summoned by his superior due to an e-mail, the loss of security files and the thoughts running inside the mind of the subordinate. It highlights the idea of a weakened...

  • Infosecurity Europe 2006: Cyber extortion is now a very real threat - is your business at risk?  // Database & Network Journal;Feb2006, Vol. 36 Issue 1, p8 

    The article focuses on the threat posed by cyber extortion to businesses. One of the most destructive method used by criminals is the Distributed Denial of Service attacks. It crashes the company's web site or server attacking them with data in the form of web request or e-mails. Recently, these...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics