Fighting spam begins with education

Do you remember what life was like before spam? When I got my first e-mail account, I used to get so excited when friends sent me e-mail but now it's not so fun. I have one or two friends who like to forward those superstitious "fill in this very personal questionnaire, forward it to 10 of your closest friends (with their e-mail addresses for all to see), and you will be guaranteed to win this week's lottery" chain messages. It's no wonder I'm in every spammer's little black book.

In addition to the anti-spam technologies that we deploy, we need to educate our users - like my superstitious friends - to be spam aware. But how do we do that, and what are the other effective technologies and techniques for killing spam in the enterprise? What can we do to ensure that e-mail is once again an effective and convenient communication mechanism, rather than a transport for junk?

I was thinking of how I could educate my friends about some of the tricks that spammers use, and so I hunted around the Web sites of some of the security vendors for help. Surprisingly, I could only find a few that provided educational material; many were focused on selling their products. The educational advice I did find was very useful (thanks to Sophos and

Below you'll find some of that advice, which you may want to pass on to your users:

  • Never make a purchase from an unsolicited e-mail. “If spamming weren't economically viable, it would be obsolete," Sophos says. E-mail users could fall prey to a potentially fraudulent sales scheme and their e-mail addresses could be sold to spammers.

  • Never respond to any spam messages or click on any links in the message. Replying to any spam message, even to “unsubscribe” or be “removed” from the e-mail list only confirms your e-mail address to the spammer. Also, it is pointless flaming the spammer as their return address could be invalid.

  • When sending e-mail messages to a large number of recipients, use the blind copy (BCC) field to conceal their e-mail address.

  • Sending e-mail where all recipient addresses are "exposed" in the "To" field makes it vulnerable to harvesting by a spammer's traps. Perhaps my friends could use this BCC option if they must send those e-mails to feed their superstition.

  • Never provide your e-mail address on Web sites, newsgroup lists or other online public forums. Many spammers use “Web bots” that automatically surf the Internet to harvest e-mail addresses from such outlets.

  • Do not click “yes” when an Active X dialog box keeps popping up unless you know exactly what you're downloading. Active X allows users to enhance Web pages with sophisticated formatting features and animation, but they also represent serious security risks, says. They keep popping up and prevent the user from going any further on a Web site. The dialog box insists that "yes" is clicked and an application downloaded. This application could be spyware, adware or Trojan horses.

  • Clear out cookies and other tracking data on your computer.

  • Use disposable e-mail accounts when filling out forms online.

  • Don't enter any sweepstakes or contests online. Most of them capture your personal information and sell it to third-party vendors, says.

  • Don't fill out any Web forms asking for your Social Security Number, driver's license, e-mail passwords, bank account information, or your mother's maiden name.

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Linda Leung

Network World
Show Comments

Cool Tech

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Crucial® BX200 SATA 2.5” 7mm (with 9.5mm adapter) Internal Solid State Drive

Learn more >

D-Link PowerLine AV2 2000 Gigabit Network Kit

Learn more >

D-Link TAIPAN AC3200 Ultra Wi-Fi Modem Router (DSL-4320L)

Learn more >

ASUS ROG Swift PG279Q – Reign beyond virtual world

Learn more >

Gadgets & Things

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >


Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

ASUS VivoPC VM62 - Incredibly Powerful, Unbelievably Small

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Stocking Stuffer

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Lexar Professional 2000x SDHC™/SDXC™ UHS-II cards

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Best Deals on PC World

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.


Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?