We’ve all encountered spam…lots of spam. It’s literally everywhere:
- Email inboxes
- Social media
- SMS and Instant Messaging (which is referred to as SPIM – Spam over Instant Messaging)
- Spam over Internet Telephone if you have a VoIP system, which is referred to as SPIT
Spam is typically done for a few reasons:
- Commercial advertising – they are trying to sell a product or service
- Non-commercial proselytizing – meaning to induce people to join a cause or organization
- Phishing attempts – in fact, most phishing is not targeted and is instead blasted out to as many recipients as possible to try and increase the odds of success
Concerns with spam
One of the main concerns with spam is security. If your team members, employees, contractors, or whoever else, are not properly trained to recognize spam, they may end up interacting with it. They might click on a link, they might respond, they might call back, etc…and provide information to the spammer that they shouldn’t have.
The spammer can then use that information to breach your systems, to breach that individual user’s accounts, or to sell that information to the highest bidder.
Regardless of whether you are running an online forum, or managing a large number of email inboxes, you have to keep storage costs into account. If you start receiving a large number of spam messages, that automatically increases your storage requirements, which means you then need to pay in order to store that information, which is essentially useless information.
Making sure you have the proper configurations and systems in place to limit the amount of spam that makes it through to your or your employee’s devices is an important step towards maintaining proper cybersecurity hygiene, and typically, system defaults just aren’t enough. So in the next lesson, we’re going to talk about proper spam management.