Posts Tagged ‘antispam’

Stepping up Security

Posted on: April 30th, 2012 by jiml | No Comments

In today’s digital age, securing your critical information – whether it be personal information or business information – is increasingly difficult. Threats are increasing both in number and in complexity and sophistication. Threats can come from individuals, groups, companies, or even governments.  In January, a Venezuelan diplomat launched a cyber attack here in the United States, aimed at disrupting our nuclear industry.   

U.S. authorities probing alleged cyberattack plot by Venezuela, Iran

Many customers have asked us about the real risk to their network.  “Why would a hacker target my business?” they ask.  Our answer is that hackers probably are not specifically targeting your business, but hackers will scan IP address ranges for weaknesses; when they find one, they attempt to exploit it to see what information they can get.  Prior to the scan, they may have no idea it is your business they are targeting, but nonetheless, hackers are an opportunistic bunch. If your business happens to have open ports on its firewall , unpatched servers or workstations, or even workstations with weak passwords, it is a matter of time before those weaknesses are exploited. According to the Department of Homeland Security, an unprotected computer connected to the Internet will become infected in a matter of minutes – not hours or days or weeks. You don’t have to be surfing the Internet to become infected; you just have to have a weakness through which your computer can become infected.

As you can see, security is paramount.  Last month we spoke about the need to protect your smartphones. A layered approach to security is required to protect your business.  Firewalls are a must, preferably hardware firewalls that do not rely on users’ input (allow or disallow access) for configuration like many software firewalls.  Additional layers of protection are necessary since most firewalls will have open ports (which need to be properly secured) for typical business traffic.  Hackers understand this as well, so it is important to have additional layers of protection such as anti-spam and anti-virus protection and software firewalls.  Strong password policies are also critical for protection. Don’t allow your business users to have local administrator privileges; is it is not necessary. Have policies in place to prevent infections or breaches and also with how to deal with those breaches of security.

Colden Company Inc. offers our customers services where we can help detect hacking attempts, perform penetration testing to ensure your network is locked down from the Internet, be notified immediately of virus infections (even for laptops out in the field), and be notified of patching deficiencies for Microsoft and third-party software. We can backup your critical data to a secure off-site location to protect you from losses. We can provide you with best-of-breed anti-spam solutions and email continuity solutions. These services are becoming a necessity as the digital age will continue to become more dangerous.  Ask us how we can help your business protect itself from the ever-increasing threats. Please contact us at (888) 600-4560, email us at or see us on Facebook or Twitter.

Fighting Back Against Spam

Posted on: July 30th, 2011 by billp | No Comments

Spam is a problem any business e-mail user deals with on a daily basis. Spam is broadly defined as the use of electronic messaging systems to indiscriminately send unsolicited bulk messages. While e-mail spam is the most common form, there is also instant messaging spam, social network spam, blog comment spam, search engine spam, and other forms. Whatever form it comes in, spam is a drain on business’ computing resources (storage, bandwidth, etc.) and employee productivity. In this newsletter, we will focus on e-mail spam since it is the biggest problem for most business users.

Spam can be used by advertisers to broadly distribute information about their products or services. Spam can, however, also be used for malicious purposes by being a vector for malware distribution. Spam can even be used for criminal purposes through the use of phishing attacks. Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Regardless of the purpose, spam is an unwelcome guest in your e-mail system.

Spamming remains a viable business because advertisers have low operating costs and it is difficult to hold spammers accountable. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet Service Providers (ISPs), which have been forced to add extra capacity to cope with the additional volume of email. Spamming has been the subject of legislation in many jurisdictions.

There are many techniques that you can use to reduce the amount of spam that finds its way into your inbox. The simplest – but most labor-intensive for the user – methods are the whitelist, blacklist, or keyword filtering approachs. Your e-mail client may allow you to create a whitelist of users that you allow to send you e-mail. The problem, of course, is that senders that are not on your whitelist will be quarantined or rejected initially. A blacklist is a more conservative approach because you maintain a list of senders that should not be allowed to send you e-mail. However, blacklists tend to be ineffective because spammers rarely send from the same e-mail address for long. Similarly, keyword filtering can be ineffective because spammers often use misspellings of common words to evade filtering.

A more effective form of spam filtering involves the use of speculative (a.k.a heuristic) filtering. Simply stated, speculative filtering works by subjecting e-mail messages to thousands of pre-defined rules. Each rule assigns a numerical score to the probability of the message being spam. This score is then evaluated against the user’s tolerance for spam (low, medium, high, etc.) to determine if the message will be quarantined or delivered.

Colden Company is proud to offer Google Message Security (Postini) to its customers. Postini uses extremely effective speculative filtering to keep spam from reaching your inbox, draining your employees’ productivity, and consuming your business’ computing resources. Postini is software-as-a-service (SaaS), meaning that it requires no additional hardware, software, or other infrastructure to be purchased. Even better, Postini stops spam, viruses, phishing, denial of service, directory harvest attacks, and other attacks before they reach your network without message loss or disruptions to email service. Google offers 99.999% availability for message processing and 100% virus protection Service Level Agreements (SLAs) for Postini, securely filtering and delivering billions of transactions each day.

Do you want to stop spam and other unwanted e-mail from ever reaching your network? Find out more by contacting us at 518-885-2857, toll-free at 888-600-4560, via email at, or on Twitter.