- Blacklist services hold information about currently reported spam servers and known offenders.
- IT managers should block servers and IP addresses that have previously sent spam.
- Verify that emails are sent from valid domains.
- Verify that the "sender" is able to receive real email, as spammers do not wish to receive returned mail.
- Reject messages with large numbers of recipients in the "to" field, as they are likely to be spam.
- Use content analysis to filter out emails containing typical spam topics such as dieting advice or loan offers.
- Incorporate predefined spam expression lists, such as "Lose pounds!," into content analysis engines.
- Deploy content analysis across a wide variety of languages, as spammers exist across the globe.
- Protect yourself from spammers who bounce their emails around other organizations' servers in order to conceal their identity.
- Spam Checklist as April Fool's Day is ApproachingProtect yourself from email flooding designed to overload and crash the server.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.