123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Educating Employees To Avoid Spam

Profile Picture
By Author: Ryan M. Pitylak
Total Articles: 273
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

For many companies spam is a serious issue, one that can affect the productivity of their employees. A recent study showed that the average computer user can spend 20 to 40 minutes every day, just wading through spam. For a small business the time spent could be like having a full-time employee on staff just to deal with spam or junk email, which constitutes more than half of the global traffic of e-mail, according to the latest report of the global computer security company Symantec.

If there is a lack of spam control it is also much more likely that destructive viruses, Trojans, worms, hijacks and phishing will be able to enter the system. If a company network is attacked by any of these, it can cause extensive damage in loss of productivity as well as expense for repairs. One important point to understand is that spam cannot be 100% eliminated, no matter what hardware or software you install. It is important for companies to set clear policies regarding the handling of email within the company, to prevent abuse and help protect the network.

Many employees are not savvy enough to recognize all spam and just ...
... one click is all it takes to shut down e-mail servers or corrupt important data, wrecking havoc on an entire company network. Any employee that has internet access should be made aware of the potential hazards of spam, how to recognize it and what steps to take. While extreme vigilance is far from the perfect solution, it seems to be a necessary precaution for any company with internet access and that means educating employees in the proper and safe use of email and the internet in general.

Educate users about what they need to do if they do receive spam. Develop a policy on the personal use of company computers for sending or receiving emails or accessing personal email accounts and determine what will be considered "acceptable use". Educate employees about "phishing" to help prevent identity theft scams.

Spammers can also harvest email addresses entered on web sites. A reputable site will adhere to a privacy policy and you will be able to opt not to receive any email promotions. Some sites don't use such ethical practices and it is often difficult to tell which are reputable sites and which are not. Educate employees to avoid entering their company email address on sites and to use a disposable email address such as Hotmail or Gmail that can be discarded if it becomes overwhelmed with spam.

An email address becomes more valuable to a spammer if it is proven to be active, and that the spam arriving at the inbox is actually being read, or at least opened. Inform employees to never click to unsubscribe link, or any link for that matter, in spam emails they receive. This only serves to identify an active email account to the spammer and will likely create an escalation in spam.

Of course these measures will never completely eradicate spam, which is most likely an impossible task since spammers continue to create new and ingenious ways to harvest addresses and invade email. But armed with knowledge and vigilance there is much an employee can do to at least keep spam at bay.

About Author: Ryan Pitylak contributes to OtherInbox, which is a spam filtering service designed to help you protect yourself from spam. Find out more about disposable email services at http://www.otherinbox.com .

Total Views: 281Word Count: 570See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: