TITLE

Protecting against knowledge

AUTHOR(S)
Bradner, Scott
PUB. DATE
October 1999
SOURCE
Network World;10/25/99, Vol. 16 Issue 43, p48
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on the limitations to filters used in outgoing electronic mails to reject and not deliver mails with abusive or offensive content. Lack of context search; Protection of a company's image; Demonstrating a mistrust of employees.
ACCESSION #
2479152

 

Related Articles

  • UNIVERSAL SECURE MESSAGING WILL RELY ON OUTSOURCERS. Kobielus, James // Network World;11/27/2000, Vol. 17 Issue 48, p65 

    Discusses security concerns concerning electronic mail systems. Impact of secure messaging to business-to-business electronic commerce; Absence of a public-key infrastructure to secure electronic mail systems; Compatibility of secure messaging with the subscription-based application service...

  • Spam is unpalatable any way it's served up. Rudich, Joe // Link-Up;Sep/Oct98, Vol. 15 Issue 5, p6 

    Provides information on spam, a term which refers to electronic junk mail. Data from a 1998 survey on spam by Novell's United Kingdom division; Disturbing aspects of spam; Proactive measures that can be undertaken to protect oneself from an uninvited spam.

  • SAFE PASSAGE. Harreld, Heather // Network World;08/28/2000, Vol. 17 Issue 35, p44 

    Focuses on electronic mail security service providers, which protect a company's sensitive messages from being read by electronic eavesdroppers. Convenience store chain 7-Eleven's use of ZixMail.com's ZixIT service to protect its corporate e-mail; Projected growth of e-mail boxes from 1999 to...

  • Experts Say E-Mail Protection Is A Must. Emrich, Anne Bond // Grand Rapids Business Journal;1/3/2005, Vol. 23 Issue 1, p7 

    Discusses the necessity for electronic mail protection in the U.S. in 2005. Problems faced in using e-mail systems; Development of an e-mail sender policy framework to protect corporate assets from e-mail frauds; Advantage of the use of preventative filtering layer in e-mail systems.

  • Hacked to pieces. Lewis, Paul G. // Inc.;1996 Inc. Technology 4, Vol. 18 Issue 17, p27 

    Details the process of a company which discovered and traced leaks in its electronic mail, or E-mail, system. The assertion that any company can be hacked; Lessons to be learned from the company's experience.

  • Sophos Email Security & DP.  // SC Magazine: For IT Security Professionals (UK Edition);May/Jun2010, p64 

    The article evaluates the Sophos Email Security and Data Protection (DP) 3.4 email security hardware appliance.

  • Common sense about sensitive e-mail. Goldsborough, Reid // Business Journal (Central New York);7/29/2005, Vol. 19 Issue 30, p20 

    Provides information on how to avoid potential problems concerning sensitive matters communicated through electronic mail. Use of e-mail-encryption utility programs to prevent other people to have access of the e-mail; Features of a program from Pretty Good Privacy Corp.; Availability of the...

  • Ask Dr. Intranet. Blass, Steve // Network World;06/05/2000, Vol. 17 Issue 23, p61 

    Advises on how to protect oneself from electronic-mail viruses such as Melissa and ILOVEYOU. Importance of logging on to a mail server to preview and weed out e-mails on the Unix server; Effort not to use Microsoft mail clients; Need to avoid opening attachments as much as possible.

  • VIRUS REMEDY: ASPs? Fisher, Dennis // eWeek;06/05/2000, Vol. 17 Issue 23, p11 

    Reports that more companies in the United States are outsourcing their electronic mail functions to application service providers in order to prevent virus attacks such as the ILoveYou virus that infected the Microsoft Outlook messaging client. Emergence of the Resume.doc bugs; Increase in the...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics