You are on page 1of 71

Protect yourself from

spam and spyware


for Newbies
Table of Contents

PROLOGUE ........................................ 6 
CHAPTER ONE - THE BARE BASICS .... 7 
WHAT IS SPAM? .......................................... 7 
WHAT IS SPYWARE? ..................................... 8 
CHAPTER TWO - ESTABLISHING A
CONNECTION .................................. 10 
DETERMINE THE NEED .................................. 10 
PUTTING YOUR EMPLOYEES IN THE KNOW ........... 12 
EXECUTION ............................................... 13 
FREQUENT SAFEGUARDS ............................... 14 
EVALUATION.............................................. 16 
CHAPTER THREE - MAPPING ........... 18 
MORE ABOUT CHOICE ................................... 18 
ActiveX and Java ...........................................19 
Browsers and Registry.................................... 19 
Cookies ........................................................19 
Beginners and Students.................................. 20 
A Few Key Employees ....................................20 
Get your employees to commit ........................ 20 
SETTING THE STAGE .................................... 21 
CHAPTER FOUR – BE IN THE KNOW 23 
KNOW THE ENEMIES .................................... 23 
KNOW YOUR FRIENDS .................................. 24 
2|Page
FINE TUNING............................................. 26 
COMPARING AND PRICING OF SPAM BLOCKING
SOFTWARE ............................................... 28 
Research ......................................................28 
Price ............................................................28 
Support and Upgrades.................................... 29 
Training .......................................................29 
References ...................................................29 
COMPARING AND PRICING OF SPYWARE BLOCKING
SOFTWARE ............................................... 30 
Research ......................................................30 
Price ............................................................30 
Support and Upgrades.................................... 31 
Training .......................................................31 
References ...................................................31 
CHAPTER FIVE - RELATING TO
OTHERS .......................................... 33 
FORGETTING THE SAFEGUARDS ........................ 33 
CHECK POINTS .......................................... 33 
GET RID OF THE SLUDGE CHECKLIST ................. 35 
CHAPTER SIX - MORE GUARDS AND
OPTIONS FOR SPAM ....................... 36 
ASP OR APPLICATION SERVICE PROVIDER ........... 36 
Spam and Blocking Programs ..........................37 
External Hardware .........................................38 
Preset Spam Blocking Program ........................ 39 
CHAPTER SEVEN – MORE GUARDS AND OPTIONS FOR
SPYWARE ................................................. 40 
3|Page
ASP OR APPLICATION SERVICE PROVIDER ........... 40 
SPYWARE BLOCKING PROGRAMS ...................... 41 
EXTERNAL HARDWARE .................................. 42 
SPYWARE BLOCKING PROGRAMS ...................... 43 
CHAPTER EIGHT – SOLVING
DIFFERENCES ................................. 45 
SPECIFIC EMPLOYEE TRAINING & HARMONY ......... 45 
GROUP AND INDIVIDUAL TRAINING ................... 46 
Preparation: .................................................46 
Delivery: ...................................................... 46 
Practice:.......................................................47 
General Points to Ponder: ...............................47 
Handbooks: .................................................. 48 
AFTER TRAINING - GETTING READY TO DRIVE ...... 49 
PEOPLE HELPING PEOPLE ............................... 51 
CHAPTER NINE - MAPPING SAMPLES
....................................................... 54 
TEST THE SPAM .......................................... 54 
ORGANIZE THE TEST DATA ............................. 55 
MAKING USE OF THE EVALUATION .................... 56 
SPAM TESTING FOR REAL .............................. 57 
SPIES AMONG US........................................ 59 
ORGANIZE THE TEST DATA ............................. 60 
MAKING USE OF THE EVALUATION .................... 61 
SPY HUNT ................................................ 63 
CHAPTER TEN – TECHNICAL REALM 65 

4|Page
DAY TO DAY STUFF...................................... 65 
CONCLUSION .................................. 68 
REVIEW OF SYSTEMS ................................... 68 

5|Page
Prologue

Today’s world is full of scams and con-artists. Now, the


schemes flow vastly and freely in cyberspace. Spam and
Spyware can and will, if left unattended, clog up your
company’s computer network. A company wouldn’t even
think twice about running their computer system without
virus protection. Protection against these other threats is
equally as important and necessary. In short, inadequate
programs will leave your business without protection.

The purpose of this book is to help steer the business


owner in the right direction. Choosing the proper program
can be difficult without the proper information. Many factors
will play a part when deciding on the program for your
business.

This book will break down some of the more difficult


and technical components into day to day language to help
you understand more about spam and spyware, which are in
a way the same, but in a way, very much different.

6|Page
Chapter One - The Bare Basics
A good starting place would be basic information about
Spam and Spyware. Understanding a problem goes a long
way in finding a solution. The company owner must select
the program, install the program, and then train the
employees in the proper use of the program. You could
have the best programs in the world but without proper
installation and use, the program would be useless. This
would be like filling up the swimming pool and not plugging
the drain. You get absolutely nowhere.

What is Spam?

Spam is like a close relative to junk mail. Junk mail is


just that, JUNK. Spam is the bad apple ready to spoil the
entire batch. Spam tries to lure you to a particular site and
tries to sell you something. Spam uses clever methods to
swindle money from even the smartest. While spam is
working its black magic on your company’s computers,
malicious viruses and Trojan worms are sneaking in the door.
Seemingly innocent and appropriate spam entices the user
to open and read the email. Subject lines often give no
clue. Spam is the ultimate in cons -- it is a liar and a cheat
and very hard to detect.

Employees have to sort through all the email and weed


the good from the bad. Emails are accidentally deleted that
should have been saved. The mailbox becomes full and
important email is lost. Spam is frequently filled with
pornography that usually has a computer virus embedded
within the body of the mail.

The company loses valuable time. Spam can be filtered


through the company and passed to other companies and
7|Page
individuals. This action can cause a law suit against your
company. A large amount of time can be spent trying to
repair damage. A large amount of money can be spent
paying for the repairs. An entire network can potentially be
shut down. The productivity of the entire company would be
affected causing a loss of revenue.

What is Spyware?

On the other hand of spam, spyware is like a sleazy,


sneaky Cat Burglar. It watches potential victims. It sneaks
in and steals valuable information from your company.
When a site is visited, a fingerprint is left. This fingerprint
can trace directly to the computer system that accessed the
program in the beginning. Spyware looks into the inner
most workings of a computer. It goes behind the dead-bolt
and surveys the room.

Sensitive company information can be exposed. This


information can be used to steal your assets. Besides the
deliberate stealing of revenue, company information can be
used in other harmful ways. The company’s information can
be used to scam others or set up a bogus store front.
Identity theft can be a huge nuisance and can definitely be
something that could arise in this case.

Another potential problem from spyware can be the


loss of company secrets. Tracking your every move -- just
waiting and looking for company information. Key loggers
track information typed or where the mouse is clicked to
obtain passwords and user ID. Most companies desire to
hide the delicate information that make the foundation
function and prosper. Spyware can be as dangerous to that
foundation as a virus can be.

8|Page
Legal protection is available. Internet Service Providers
are eager to catch and prosecute the offenders. Local,
State, and Federal agencies have special task forces to do
their own tracking for these felons.

9|Page
Chapter Two - Establishing a
Connection

Determine the Need

Determining the need may seem a bit redundant. The


need is obviously for Spam and Spyware blockers. The
actual choosing of the proper program will be more involved.

Begin with the following considerations:

9 How many employees are in the company?

9 How many computer terminals are utilized?

9 Are the employees in one proximity?

9 Are the employees spread around the country?

9 Which terminals receive emails?

9 Which terminals send emails?

9 How much Spam does the company receive?

9 How much Spyware does the company receive?

9 Does every employee receive and send email?

9 Are computers linked or are they separate?

The size of the company and number of terminals will

10 | P a g e
have the biggest impact in the selection of a blocking
program. Terminals in one location and linked usually
require one program with a fee for multiple users. Terminals
in different locations but are linked usually require more
than one program with a fee for multiple users. Multiple
stand alone systems usually require a program for each
terminal.

The volume of email sent and received will determine


the type of program. It goes without saying that the higher
the volume, the higher the risk. The program will have to be
set so the offensive is filtered out while allowing important
emails to arrive in the mailbox. Most Internet Service
Providers (ISPs) have Spam and Spyware programs included
with their service. These programs will have to be set also.
It is still recommended that a blocking program be
purchased in addition to that of the Internet Service
Providers. The available space on the hard drive will be
affected as Spam is filtered and offenders are sent to the
quarantine vault.

Just how savvy are the employee’s computer


skills? Some of the blocking programs are complicated and
require advanced user installation.

How many will you have to train at a sitting?


Training will be vital to the usage of the program unless you
want the terminals frozen. Consider the difficulty of the
entire training process and the length of time required to
train.

Support is another consideration to ponder. Not


all programs offer technical support with their blocking
system. This could be an additional cost. However, you
should keep in mind that support is vital. Regardless of how
simple a program is to use, something will go sour and

11 | P a g e
technical support will be required. Getting the support of
the employees will be necessary. Unwilling staff will make
utilization of the program difficult and not run smoothly.

Some questions to consider:

9 Do updates come with the program?

9 Are they included in the cost or additional?

Each one of these factors will determine the right


blocking system the company will require. Make a list and
then start window shopping. If a program offers a trial,
consider using it on one or two of your terminals in various
locations. If they don’t offer a trial, ask for one and see if
one is available. Be sure they know you are comparison
shopping as this may make one available even if it wasn’t to
begin with.

Putting Your Employees In The Know

Employees should be consulted about the types of


Spam and Spyware they receive.

Things to consider:

9 How much of each do they receive on a daily basis?

9 Are they plagued by pop-ups or mainly emails?

9 How likely are your employees to be lured to a site?

Keep in mind, these spammers and sneaks are very


clever. They can even make the email seem as if it
originated within the company. They can change the address
12 | P a g e
and make it look like you are at an official site in which the
company does business.

Prepare employees for the installation of the blocking


software. When installing software for a large network or
many different terminals, coordination will be advised. You
will want to set a time so preparation at the work station is
done. Meaning, backups made, important work and emails
or other data is properly saved. Prepare installation for a
time when there is less overall usage or at night when
employees are away. Staggering the installation might be
necessary.

Execution

Just how does the software program protect a system


from invasion?

9 The program is either installed using a disk provided or


it is downloaded.

9 Once installed, registration is required. Most software


programs will send a key to unlock the program for
use.

9 Acceptable addresses are placed in the filter.

9 Unacceptable addresses and key words or phrases are


placed in the filter.

9 Alerts and notifications of unsafe locations are placed


into the filter.

Once this is complete, run the program. Observe the


scanning and be sure everything is working properly and set

13 | P a g e
to the proper specifications for your needs. After this,
regular scans for Spyware, Spam, and tracking cookies
should run. Any offenders will be placed either in a spam
folder, in quarantine, healed, or deleted. This will depend on
the settings you specified during installation. Emails placed
in the spam folder can be viewed to ensure an acceptable
email was not sent to this folder. In the early stages of the
program, this would be advisable.

Frequent Safeguards

Regular maintenance is necessary to keep each


terminal running smoothly for both the business and the
blocking software. In order to maintain harmony, certain
safeguards need to be set up and followed.

9 Check the vaults. Clear frequently to avoid sluggish


performance. Valuable disk space is used with the
quarantine vault.

9 Review and update the acceptable emails and sites.


This is referred to as a “white list” - Meaning the good
guys. As more and more spammers and spyware are
introduced, the program has to be informed to prevent
the good guys getting placed in the wrong area or
deleted.

9 As the blocking software works, the unacceptable


emails and sites will also be working. These
undesirables are frequently referred to as a “black list”.
This will require restructuring of the software to capture
the bad guys. Settings will need to be changed,
informed, and updated.

9 To keep the blocking software program working for your

14 | P a g e
company, regular updating of the program will be
required. Just as the user has to adjust the settings
regularly, the software program has to be kept current.
New schemes and threats are developed each and
every day. As these become apparent, the parent to
the blocking software works to add to the program
specific to these threats. Also, changes in the internet
programs, operating systems or email service will
require bringing the software current. Think of updates
as reinforcements for the working army.

9 Set a regular schedule for these operations and see


they are followed. In the early stages of the program,
it would be in the best interest of the company to set a
more frequent maintenance operation. As the users
become more familiar with the software and settings
seem adequate for your needs, then it would probably
be safe to lengthen the time for the schedule.

9 Consider automatic updates and downloads for the


blocking software. This would prevent a delay in major
updates that could be serious threats to the computers.
It would also be a good idea to have specified persons
within the company to oversee these maintenance
operations. This should be someone familiar and
computer knowledgeable. Make sure the network
computers are getting the updates and performing the
maintenance required. Make sure each network is
getting use of the entire system including alerts,
automatic updates/scheduled updates. This would be
especially important for the terminals not close and
independent computer systems.

9 Just like regular maintenance for your car such as


regular oil changes are needed to keep the automobile
running smoothly. Regular computer and software

15 | P a g e
updates are required. Remember, nothing is going to
work for your company if it’s not used. Programs
without updates will soon begin to look like a piece of
Swiss cheese that is full of holes.

It’s a little like homework. Homework that is complete


and kept up helps school go smoother. Homework that is
not completely done or not done makes it hard at school.
You’re not armed with enough knowledge to pass the test. A
blocking software program not checked daily and not
updated is not going to make the grade and give the
company the protection it needs.

Evaluation

Ok, homework is done and now comes the most


important aspect. Which blocking program should be
purchased? It’s time to sit back and take stock.

Here is a checklist to work with:

9 Evaluation of the company’s computer network has


been completed.

9 There is an accurate count and location of each that


uses the internet and gives and receives email.

9 Employees have been evaluated to determine the


nuisance from Spam and how often they are mistakenly
taken to an undesirable site.

9 Consideration for the employees knowledge to use the


program is noted.

9 Training schedules have been established.


16 | P a g e
9 A comparison between different programs has been
completed.

9 The comparison includes the cost, support, upgrades


and training of the employees.

9 Computer system has been evaluated to the size.

9 Computer system has been evaluated for system


requirements.

Now, a choice can be made. After the choice is made and


the software is installed, you should do the following:

9 Take note of the working aspects of the software.

9 Look at the settings and check for accuracy and need.

9 Make sure the company’s computer network is


operating without difficulty.

9 Make sure access is still available to frequently used


web sites, company home page, and email.

9 Train and learn the software program.

In the next chapters, more detail will be discussed


regarding the specifics of Spam and Spyware.

17 | P a g e
Chapter Three - Mapping
Remember the definition of spyware? Spyware is a
method to get information about your company without your
permission and without your knowledge. It will follow the
paths of the user and send it to the originator of this
predator. Spyware also records the user’s key strokes in
order to configure passwords, account information, and
company’s vital information. Because Spyware can obtain
such valuable information and sensitive information, this
chapter will map out specifics to choosing a Spyware
Blocking program.

More about Choice

Every company and every personal computer user tries


to access only the “trusted site” zone, email from and to
known associates and so on. Regardless of how careful the
user is, there’s always a point of entry to access.

Consider the news in just the past few years. There


have been reports of programs requiring a patch after
discovery of a Trojan worm or virus. There have been
reports where one individual was responsible for mass
spamming and use of spyware to steal millions. These are
simply just warnings of emails and software downloads that
have been spam or some type of spyware; yet, we still seem
to not take action at the most critical times.

We cannot be expected to do this alone nor should we


try. Spyware blocking software examines critical areas and
programs on the computer system.

18 | P a g e
ActiveX and Java

These are two programs used in every operating system


using the internet. This is an area where spyware frequently
gains access to the system and tries to hide its presence.

Browsers and Registry

Spyware programs gain access by attaching itself to each.


This allows total freedom for attacking the home page, and
anywhere the user travels using the internet.

Cookies

Cookies are used to track your use. While there can be


advantages, this is the ultimate in spying on the users every
move. Every move the user makes will get a cookie.

Spyware blocking programs scan these important


aspects of the computer and any other or all files in the
system. Then the program will remove, heal, or “jail” the
offenders. This includes fixing registry items or changes to
programs.

Many of the same considerations are necessary when


choosing Spyware removal programs as in anti-spam
programs. One major difference would be the gateways to
the company’s sensitive information. A functional and useful
spyware blocking program must take care of these offending
methods to the company computer system.

Let’s take a quick look at what you should look for:

9 The system should have an alert system.


19 | P a g e
9 The removal software should have ability to scan
different settings one being the entire computer
network and another for particular files, programs, etc.

9 Support should be included. Again this may be included


or have to be purchased separately.

9 Most important, Updates, Updates, and more Updates -


with a notice when new updates become available.

Beginners and Students

Preparing employees to utilize the program will be


important for proper function of the program. Set up a
thorough instruction to the workings from beginning to end.
Include in this instruction how to manage and look for
updates. Include how and when to seek support.

A Few Key Employees

Consider selecting a few employees who oversee the


Spyware blocking program. These workers can help keep
the other users up to date and train new users. It is a big
help to have a few select people to manage updates, scans,
vaults and support. The fewer people managing the
program though, the fewer mistakes there will be with the
use of the program.

Get your employees to commit

Spyware to the company computer network is like a


spy in the government. Both strive to get secrets and

20 | P a g e
valuable information. Both take this information and use it
in ways that can cause serious, unrecoverable assets and
operations. Therefore, it’s important to ensure that your
employees are aware of all the proper procedures and
policies so that everything will run smoothly; otherwise, if
your employees do not commit themselves to this – it could
drastically fail.

Setting the Stage

After installing the program, immediately run a scan.


The program will give an option for the initial scan. Choose
Yes. You will be surprised at how much Spyware is contained
in the company’s computer network.

Test this again by signing on to the internet and


browsing for 5 to 10 minutes. Then run the removal
program again. Again, you’ll be surprised by the amount of
Spyware offenders in your system.

Some helpful tips:

9 Use the tutorial program for operation of the program.

9 Follow the guidelines for settings and security.

9 Make sure the internet programs and emails work


properly.

9 This might sound funny but check for updates.

Programs that are on disk or downloaded are of specific


format and content. Updates and changes to the program
may have come out since the development of the original
program.

21 | P a g e
So, let’s do this:

9 Develop a regular scan system. This is best done


during down times or periods of slow use.

9 Don’t have the internet open when you scan.

9 Also, scan at other various times between the


scheduled scans.

9 Scan when programs become sluggish or frequent error


alerts appear.

KEY NOTE: Don’t be shy about running scans for Spyware.


This feature can’t be over used.

Spyware blocking programs can save the company


valuable time, loss of revenue, and from the loss of sensitive
information. Proper training, use, and maintenance of these
programs are absolutely essential for proper protection.

22 | P a g e
Chapter Four – Be in the Know
Know the Enemies

When trying to rid the company’s computer network of


spam and spyware, it helps to know how the threats work.
Numerous methods are used to gain entry to the computer.
Unfortunately, newer ideas will come up from these
predators on a daily basis and we simply cannot keep up.

The most well-known vehicle for spam is email. The


Spammers will buy email in mass. The sellers of the
addresses come from various methods. Web sites that
require a user to register most often sell email addresses.
Some web sites just require the user to enter their email
address or the address and a password. The user can bet
the email address will be sold. Regardless of the promises,
the email address is sold.

Email addresses are practically free for picking at


certain sites. Web based support groups, chat rooms, and
even fan clubs are open to any user. The spammer simply
opens the site and has access to masses of email addresses.
Requesting the email address be removed results in this
request to be sent to many. Information from the different
groups, survey responses or some type of specific data
retrieved from these sites is vital and necessary for the
business and because this happens, the company network is
vulnerable.

Directory attacks are really fairly easy for the spammer.


The average user doesn’t even know that the directory is
open and so friendly. This happens through the internet in
which the email is received.
The company should check to see if VRFY is supported
23 | P a g e
and turned on. This method of attack can result in mass
spam emails to every computer the company has in use.

Spammers are getting cleverer at by-passing the spam


filter settings each and every day. This is achieved in
numerous inventive ways.

9 The villains will send out emails that look absolutely


real.

9 The illegal use of various company names as the sender


is used.

9 Mass emails are sent with the same content but


different content in the subject line.

9 Another method used is to deliberately type in extra


letters, numbers, or characters within the words in the
subject area. Since the filter can’t read the key words
that indicate spam the email is allowed into the in box.
Blocking these addresses is difficult since they
constantly change both from the origin and the arrival
of the email.

But, why all the effort to get the spam to you? Simple -
Money. If a hundred emails are sent and they get one
response, they get money. They make money from the sale
of addresses. Spamming is big business. Illegal, but big.

Know Your Friends

Spam filters work to keep predators away. They need


to be told what to do and who to do it to.

How can you help? Let’s take a look at a quick list of


24 | P a g e
things that you can do in order to help your spam filters
work properly and keep the awful predators away from your
company’s computer and computer system.

9 Customize the keyword list frequently.

9 Add the address from spammers even though it will


probably change.

9 Set the filter to recognize emails offering something to


sell. The filter can recognize part of the name

9 Check frequently for patches. This can be done best by


going to the home page of the operating system used.

Spammers work hard to get to you. The operating


systems work hard to keep them away. Patches cover the
means in which the spam entered. An operating system
also tries to upgrade its program to be more sophisticated in
order to outsmart the offenders.

What are some other ways you can help?

9 Watch for notices and alerts of patches available.

9 Keep the company’s spam filter updated frequently.

9 Run the scans. Don’t just rely on the preset days and
times to scan.

9 When entering sites that require the email address


and/or other information, change the password often.

9 Change the password to the company’s computer


system often.

25 | P a g e
9 Don’t let these changes be predictable, if at all
possible. Re-work the password at odd and various
times. Never set a specific day and time to reset
passwords.

9 Learn to recognize spam; don’t rely on the program


alone. Train the employees in techniques used by
spammers. Train the staff to recognize suspect subject
lines and bogus content from addresses.

Fine Tuning

Begin with the capabilities of the company’s computer


network.

9 What is the size of the system?

9 Does the company plan to increase or add to the


system?

9 How much work will be required of the computer?

The answers begin with the size of the company, the


volume of internet and email use and the size of the
computer.

9 Get the configuration of the bandwidth. This will be a


determining factor with the spam blocking software.

9 If email volume and internet usage is high on an


average day, the spam filter must have the capacity to
operate the large load.

Consider the foundation of the network and the path it


takes to your network.

26 | P a g e
The email begins with the internet server’s email
system, passes through the spam filter.

If the spam filter deems this clean the email is


forwarded to your company’s computer network.

While keeping this in mind, realistically determine the


volume for the filter.

Staff will send and receive emails from clients and


customers. The addresses of each contact should be placed
in the contacts allowed in the browser setting, in the spam
filter and in the address book. Failure to add a client to this
list could result in the correspondence being sent to the
spam folder.

Take into consideration the type of business the


company deals with. The filter will need to recognize the
keywords pertaining to the company business. Keywords
will need to apply to both incoming and outgoing.

Set limitations for personal computer use of the company’s


system.

Blacklist certain sites such as:

Game sites or Chat rooms

Limit browsing at random for items such as gifts or


cars. Allow only a certain amount of time for personal use.
Prohibit the receiving and sending of jokes, and mass
forward emails. Let the staff open these on their personal
computer. Set a standard for company email sent to clients.

Make sure each staff member is informed and willing to

27 | P a g e
follow these guidelines. The company wants the email sent
to their clients, not a spam folder, and they want it to not be
available to spammers.

Request your clients follow similar guidelines for the


same reasons. This move will make for safer exchanges.
Strive for precise wording in the subject line. This will help
avoid different interpretations of the subject line.

Comparing and Pricing of Spam Blocking


Software

Let’s look at the maker and owners of the spam blocking


software. Prepare a list of questions tailored to the
company’s needs. Ask for specifics and request they explain
their response.

Research

Determine the features, size, and computer requirements.


Can the program be tailored to the company’s needs? Will
the software be capable to run properly according to the
company’s email volume?

Price

Ask exactly what is included with the quoted price. Inquire


specifically about upgrades and support. Let the seller know
the company is comparison shopping. Most will be willing to
negotiate a price when the deal is of a sizeable nature.
Discuss cost of multiple stand alone personal computers and
network computers. Find out if there is a trial program and
what guarantees are offered.
28 | P a g e
Support and Upgrades

Inquire about internal testing of the program. If the support


is to be purchased separately, find out if the coverage
purchased includes the entire program. Determine if the
support agreement needs to be renewed yearly or if the
agreement is for life of ownership.

Training

Inquire about onsite training. Be sure to ask if there is a


limit to a class and the number of classes. If no onsite
training available, ask if phone or instant messaging training
assistance available. Consider sending the group that will
oversee the software operation to the manufacturer site if
available. Request written manuals, help and tutorial in the
program.

References

Ask for a list of references and actually follow up with the


list. Prepare in advance a few very key questions regarding
the performance, support, and upgrades of the software.

Don’t hesitate to request specifics about the manufacturer.


Ask how long they have been in business and how long the
software has been in the works. Is the manufacturer large
with a large client base?

Are they listed with the Better Business Bureau? Perform a


search about the software company. Look for alerts or
grievances that might be placed on the FTC website.

29 | P a g e
Do they list the company’s main personnel? How many
employees are available? The company needs to be assured
the software company is large enough to handle your
business.

Comparing and Pricing of Spyware


Blocking Software

This section is very similar to that of spam blocking


software; however, for re-enforcement and an easy list to
run down, the instructions will be repeated in a manner of
speaking.

Let’s look at the maker and owners of the spyware


blocking software. Just like with the spam blocking
software, you should properly prepare a list of questions
modified to the meet company’s needs. Ask for details and
demand they explain their response. This will allow you to
know whether or not they know what they are doing and
what they are talking about – you’ll feel much safer by doing
this.

Research

Determine the features, size, and computer requirements.


Can the program be tailored to the company’s needs. Will
the software be capable to run properly according to the
company’s email volume?

Price

Ask exactly what is included with the quoted price. Inquire


specifically about upgrades and support. Let the seller know
30 | P a g e
the company is comparison shopping. Most will be willing to
negotiate a price when the deal is of a sizeable nature.
Discuss cost of multiple stand alone personal computers and
network computers. Find out if there is a trial program and
what guarantees are offered.

Support and Upgrades

Inquire about internal testing of the program. If the support


is to be purchased separately, find out if the coverage
purchased includes the entire program. Determine if the
support agreement needs to be renewed yearly or if the
agreement is for life of ownership.

Training

Inquire about onsite training. Be sure to ask if there is a


limit to a class and the number of classes. If no onsite
training available, ask if phone or instant messaging training
assistance available. Consider sending the group that will
oversee the software operation to the manufacturer site if
available. Request written manuals, help and tutorial in the
program.

References

Ask for a list of references and actually follow up with the


list. Prepare in advance a few very key questions regarding
the performance, support, and upgrades of the software.

Don’t hesitate to request specifics about the manufacturer.


Ask how long they have been in business and how long the
software has been in the works. Is the manufacturer large

31 | P a g e
with a large client base.

Are they listed with the Better Business Bureau. Perform a


search about the software company. Look for alerts or
grievances that might be placed on the FTC website.

Do they list the company’s main personnel? How many


employees are available. The company needs to be assured
the software company is large enough to handle your
business.

32 | P a g e
Chapter Five - Relating To Others
This section details management and delegation of
duties.

Forgetting the Safeguards

Now that the anti-Spyware and/or Spam software is


installed, it’s time to perform the checks to assure the
program is running properly to the computer networks
specifications. Check every individual terminal. Issue new
user accounts, passwords, and separate email accounts.

Remember the maintenance. Installing a Spam filter is


an excellent step; however, that’s not the end of it.
Management of the software is essential once the spam filter
has been installed just as the constant monitoring and
revamping is needed to keep up with the changes in spam
methods. Updating schedules and watch points make
security more effective.

In order to stay up to date and keep a lot of stress off


of your own shoulders, delegate specific monitoring and
defensive actions to responsible employees.

Check Points

Set up a chain of command. Construct a solid plan for


employee training including who, when, where and how.

1. Have a structure for in house training personnel,


support personnel, and application. Designate one
person or persons who will contact support outside of
the company’s business and make the necessary
33 | P a g e
adjustments to the computer.

2. Instill a concrete training program. Of course, the


initial training will have to be completed swiftly.

3. Make a schedule so the training will not disrupt the


entire company work day.

4. Once initial training is complete, construct a system of


mini seminars and refresher courses.

5. Set up specific days to update employees on changes


to the program.

6. Make an orientation program for new hires and


returning work force.

7. Schedule internal observation sessions so the trainer


can evaluate each terminal user. Determine that the
employee can execute and apply his knowledge.

8. Oversee the establishment of each users email address.


Change passwords as recommended earlier in the
book.

9. Monitor for glitches in the email system. Keep records


of Spam that slips by the Spam filter. Define and
identify the reasons for the slip. Use this knowledge for
training and refresher courses.

10. Monitor the volume of email that the system can


handle without problems. Make sure the computer
networking links properly to each other. Follow up on
disturbances between networks.

11. Follow up on Spam that finds its way from one

34 | P a g e
network terminal to another. Seek support for these
leaks. Make sure each computer network terminal is
loaded properly and updates are complete and up to
date.

Get Rid of the Sludge Checklist

9 Set up systems for data protection.

9 Utilize back-ups and set up restore points.

9 Set up a system to bring the Spam filter up to date


after restoring.

9 Have a contingency program for system failures.

9 Have a firm policy regarding power ups, down loads,


and shut downs.

9 Prepare a regular time to clean registries, browsers,


and to defrag.

9 Give each employee in the chain of command specific


directions and job descriptions regarding the computer
system and responsibility for spam prevention.

9 Take steps to protect valuable information before the


problems actually occur. It’s hard to locate information
that is lost in cyberspace.

9 And most importantly, remember, prevention is the


best defense.

35 | P a g e
Chapter Six - More Guards and
Options for Spam
It’s time to deal with the different types of spam and
programs. This means how they will be delivered and
utilized as filtering software. General users on personal
computers would most probably download a free or
inexpensive software blocking system. A company can’t
afford to pick just any old software and download the
program. There are other methods of spam and blocking
programs to install or use.

ASP or Application Service Provider

In this system, email goes through the ASP first and


then it is forwarded to the company. Your company will
establish with the ASP the perimeters such as the type of
business it deals in and keywords, senders and receivers,
etc. The ASP will have a format, which will be completed
and then uses this format to forward emails to the company
and send the spam to the junk pile. The pitfall to the
system, there’s not much - if any - opportunity to inspect
the spam folder for mistakes.

Let’s take a look at some of the benefits:

9 The Company will not need to change settings and


format to its system.

9 Less opportunity to “mess up” and create chaos in the


company computer infrastructure.

9 Less likely to lose service in event of major event such


as a damaging tornado.

36 | P a g e
9 Reduction of liability if Company’s format is captured
and forwarded to others. This is unlikely since the
Company directory will not be directly available.

9 Reduction of employee time dealing with spam, or


spending dealing with support personnel.

9 Less time spent with software management like


upgrades and changes in spammers ever-changing
attack techniques.

9 Less space used on the Company computer since the


ASP will carry the program.

Spam and Blocking Programs

The next spam prevention method to discuss is the


spam and blocking programs.

This type of system is generally what the user typically


considers as the only choice available. Of course, this has
already proved otherwise. The purchase of a software
program is not necessarily the only way to add or use
features such as protection programs. By the way, other
useful programs can be obtained for use without purchasing
but that would be an entire other book.

Some information on spam and blocking programs:

9 Puts the Company in the driver’s seat.

9 Email can’t be read by a third party administrator.


9 Manage frequent changes such as whitelist, blacklist, or
keywords in house.

37 | P a g e
9 Manages updates, policy, and support in house.

9 The Company uses space on its system.

9 The Company is responsible for setting the controls,


safety features, and directories.

9 Monitors Spam and Directory attacks in house.

9 Knows and manages its employees, their use and their


location. Unlike ASP, you might not be apprised of the
location or true owner.

External Hardware

Next on the list of Spam and managers is the External


Hardware. The external hardware closely resembles the ASP
in the aspect that the email goes through the external
hardware then to the main system. One big difference, the
company owns the hardware, the software, and stays in
house.

Let’s take a look at some info on external hardware:

9 Basically, the spam and program independent of the


main computer network.

9 Not much in the way of changing the main computer


operating system. Meaningless tragedy and
breakdown. Less potential to directory attack. Total
loss if Tornado strikes particular area.

9 Control settings, blacklist, white list, or keywords are


left to the Company.

38 | P a g e
9 Company is responsible for managing updates, patches,
and support needs.

9 Overall, less employee time dealing with Spam. More


than would be with an ASP, less than the software.

9 Not much data space available.

Preset Spam Blocking Program

The last selection is the installation of a preset Spam


blocking program.

9 Installed on each and every terminal.

9 Works independent of each other.

9 Each user manages each aspect of filtering, updates


and support.

9 Little control over settings to system.

9 Little control over keywords, white list, or blacklist.

9 Usually checkbook friendly.

9 Usually downloaded.

As in every business decision, there are benefits and


risks to consider. When choosing a Spam Blocking Option,
the Company must weigh the “Risks verses the Benefits”. It
goes without saying; the choice made will have a huge
impact on the Company computer network.

39 | P a g e
Chapter Seven – More Guards and Options
for Spyware

Now, it’s time to deal with the different types of


Spyware programs. This means how they will be delivered
and utilized as filtering software. General users on personal
computers would most probably download a free or
inexpensive software blocking system. A company can’t
afford to pick just any old software and download the
program. There are other methods of Spyware blocking
programs to install or use. These are normally paired with
the Spam blocking program, but can, and in many company
profiles, should be separate.

Although the guards for spyware are very similar to that of


the spam, we will re-enforce this information and an easy to
use list. The instructions will be repeated in a manner of
speaking.

ASP or Application Service Provider

In this system, email goes through the ASP first, then


forwarded to the company. Your company will establish
with the ASP the perimeters such as they type of business it
deals in and key words, senders and receivers, etc. The ASP
will have a format which will be completed and then uses
this format to forward emails to the company and send the
Spyware to the junk pile. The pitfall to the system, there’s
not much - if any - opportunity to inspect the Spyware folder
for mistakes. This is a solution where the Spam and
Spyware program would be included within the same
coverage as a paired program.

9 The Company will not need to change settings and


40 | P a g e
format to its system.

9 Less opportunity to “mess up” and create chaos in the


company computer infrastructure.

9 Less likely to lose service in event of major event such


as a damaging tornado.

9 Reduction of liability if Company’s format is captured


and forwarded to others. This is unlikely since the
Company directory will not be directly available.

9 Reduction of employee time dealing with Spyware, or


spending dealing with support personnel.

9 Less time spent with software management like


upgrades and changes in Spammers and Spyware
programs ever-changing attack techniques.

9 Less space used on the Company computer since the


ASP will carry the program.

Spyware Blocking Programs

This type of system is generally what the user typically


considers as the only choice available. Of course this has
already proved otherwise. The purchase of a software
program is not necessarily the only way to add or use
features such as protection programs. By the way, other
useful programs can be obtained for use without purchasing
but this is another book.
Spyware Blocking Programs:

9 Puts the Company in the driver’s seat.

41 | P a g e
9 Email can’t be read by a third party administrator.
Manage frequent changes such as white list, blacklist,
or keywords in house.

9 Manages updates, policy, and support in house.

9 The Company uses space on its own system.

9 The Company is responsible for setting the controls,


safety features, and directory safeguards.

9 Monitors Spyware and Directory attacks in house.

9 Knows and manages its employees, their use and their


location. Unlike ASP, you might not be apprised of the
location or true owner.

External Hardware
Next on the list of spyware and managers is the External
Hardware. Closely resembles the ASP in the aspect that the
email goes through the external hardware then to the main
system. One big difference, the Company owns the
hardware, the software, and stays in house. Another one
that would most probably be paired with the Spam
protection.

Let’s take a more detailed look into the world of the external
hardware in the aspect of spyware protection:

9 Basically, the spyware and program are independent of


the main computer network.

9 Not much in the way of changing the main computer

42 | P a g e
operating system. This means less tragedy and
breakdown. Less potential to directory attack. Total
loss if Tornado strikes particular area.

9 Control settings, blacklist, white list, or keywords are


left to the Company.

9 Company is responsible for managing updates, patches,


and support needs.

9 Overall, less employee time dealing with Spyware. More


than would be with an ASP, less than the software.

9 Not much data space available.

Spyware Blocking Programs

The last selection is the installation of a preset Spyware


blocking program.

9 Installed on each and every terminal.

9 Works independent of each other.

9 Each user manages each aspect of filtering, updates


and support.

9 Little control over settings to system.

9 Little control over keywords, white list, or blacklist.

9 Usually checkbook friendly.

9 Usually downloaded.

43 | P a g e
Spam protection helps with many helpful and necessary
matters like time, and the bottom line. Spyware protection
does the same, but in the same way provides even more
valuable protection. Choosing the manner in which the
protection is supplied results in another choice.

Do you want this protection in one location or in several


locations? The answer to this depends on the following
considerations:

9 The size of the company.

9 The location of the company.

9 The nature of business.

9 Number of Employees available to oversee the entire


network.

9 Internal support and recovery personnel available.

9 Amount of company dollars available.

A company whose primary business deals with


extremely sensitive issues would benefit from one central
area. In the same sense, individual stations with individual
protection might be just as beneficial. Two aspects of the
same solution.

As in every business decision, there are benefits and


risks to consider. When choosing spyware protection
options, the Company must weigh the “Risks verses the
Benefits”. It goes without saying; the choice made will have
a huge impact on the Company computer network.

44 | P a g e
Chapter Eight – Solving Differences

Specific Employee Training & Harmony

Face it, not many employees “LIKE” the idea of


mandatory training seminars. Even fewer like the idea of
new employee orientation. In like industries, orientation
tends to be very similar with only a few minor differences.
The exception in this case is the Spam and Spyware blocking
program used from company to company, regardless of how
similar they are in nature. There are companies whose work
is so sensitive that the software programs will vary from
area to area.

Obviously, the training of this software is of utmost


importance. The security of the company is dependent on
this. The security of customers is at risk with poor
operation. The company is at a liability without the
protection. Loss time and productivity is at risk with
inadequate performance.

Overall, take into focus the training needed. When the


majority of the personnel to be trained feel the computer is
not so friendly, then the training needs to cater to this
particular group. On the other hand, if the users are
computer literate genius’ and really savvy, don’t treat them
like first graders. Before developing ANY training program,
consider the audience. Failure to do so results in failure.

45 | P a g e
Group and Individual Training

Nearly everyone can be taught to use most any


software program with the proper hands-on training. Group
training is more time effective; however, it definitely
requires more physical equipment at one sitting. This is
usually an effective method when the group is of mixed
experience or the instructor isn’t sure in advance of the
group experience.

Let’s take a look at how this can adequately be performed:

Preparation:

9 Know the material that needs to be taught.

9 Outline the facts and check the accuracy.

9 Have handouts, class tools such as pen and paper


separated and ready to hand out, pick up, or on each
seat.

9 Make sure computers are up and running properly.

9 Plan in advance for breaks, questions, and practice.

Delivery:

9 Remember a simple rule for speaking:

o Start by giving a brief overview with what will be


discussed.

46 | P a g e
o Discuss the subject. (Teach the class)

o End with a brief review of what wasdiscussed.

9 Remember your audience.

9 Speak precisely and clearly.

9 Keep the class flowing smoothly.

9 Use overheads to bring teaching into focus.

9 Stick to the time format.

9 Don’t get off the subject.

9 Don’t ramble.

Practice:

9 Give the allowed time to practice.

9 Don’t put practice aside for any reason.

9 Schedule ample time for practice.

9 Have enough tutors to help with practice.

9 Offer guides that help with the hands on practice.

General Points to Ponder:

9 Don’t make fun or make light of someone’s lack of

47 | P a g e
understanding.

9 Be willing to repeat when necessary.

9 Keep things friendly.

9 Don’t be harsh, condescending, or “too smart”

9 Be professional.

9 Show Confidence.

9 Don’t tell a joke if you “can’t tell a joke”

9 Be calm.

9 Be direct.

9 Be in charge of the class not the other way around.

9 Start on Time.

9 End on Time.

Handbooks:

Handbooks are not the greatest tool for every user;


however, they are an excellent tool to issue alongside verbal
and hands-on teaching. This goes back to knowing your
audience. “Techies” can take a handbook and sail right
along. The less than average computer user will probably
get more benefit from “hands-on” with the handbook to go
along with the classroom training.

More often than not, people will need the visual clues
48 | P a g e
and the handbook. Handbooks are most helpful to most
users as a reference guide after learning. It’s something
they can go back to should a question arise at a later time
after the initial training.

Try to include hands-on practice and the handbook for


users to keep. The company will benefit from the training
and references made available to its employees.

Attempt to format the handbook in a simple, easy to


follow way. Keep instructions with instructions. Put
definitions at the beginning of each section, or in a
dictionary format at the end – or even both. Be sure to start
with a table of contents for the ease of finding specific
issues.

Techies would probably rather flip to the specific section


they need help with rather than reading the entire handbook
from the beginning to end. Newbies would rather read from
the beginning to the end and be able to understand what
they are reading; hence, the use of definitions.

It’s important that everyone wins so that your company


can be properly protected as well as your customers.

After Training - Getting Ready to Drive

At this point, the software program has been selected.


The training has been completed. The computer is up and
waiting. With all things in place, what could possibly be left
to organize? Well, maybe the actual installing of the Spam
and Software Program.

Most casual users would just pick the first program


they came across and download it. Disaster is waiting to

49 | P a g e
happen with this method. A disaster a company absolutely
cannot afford to let happen. Careful planning of the
program installation is as important as the program itself.

Let’s take a look at a quick mapping of this process:

9 Map out the schedule to install.

9 Select the most vulnerable stations first.

9 Select a time that will not interfere with company


operations.

9 Notify each department head.

9 Double check that everyone concerned is on board.

9 Begin with the installation on a small percentage of


terminals.

9 Run a test on the terminals after installation.

9 Once all “kinks” are worked through, proceed with the


install schedule.

During the installation, it’s necessary to have people on


board that can help to work through the “kinks”. Also, have
the personnel available to offer “touch-up” training to calm
last minute jitters and clear any confusion not addressed
previously.

Remember when preparing the installation; notify


customers that there may be a down time. Customers and
clients need to be alerted of this information and know who
and how to contact during this time period. Otherwise, you
could lose customers and clients during this process.

50 | P a g e
Troubleshooting, staggered schedule, support or
training personnel and the legal eagles will help make this
transition smoother. There can’t be enough planning or
assistance when first starting the use of anti-spam or anti-
spyware software. Make less trouble for your employees
and in return, you will receive less trouble. Preparation is
essential here.

People Helping People

Run time, practice, training; all good points to consider.


Make a list of people needed to get the project off and
running.

Boards, owners, and the bank are usually the first


people to approach with any project. Ideas are great, but
generally speaking, require money.

9 Outline the program desired.

9 Detail the need. Be sure to include statistics.

9 Detail the benefits.

9 Show the costs including training

9 Create a sense of the cost without a program

9 Invite everyone needed:

o Administrators

o Bank

51 | P a g e
o Board of Directors

o Legal Counsel

Once the details are complete, use the time to also


include a demonstration for everyone.

Discuss the initiation of the Spam and Spyware


blocking program with your clients and customers. Let them
know there will be some changes, when to expect these
changes, and how it will affect their business with you.
Consider a test run sending and receiving emails from each.
The reason for this is to ensure the smoothness of the
installation and to be sure their system is compatible with
yours.

Have the legal eagles prepare a letter or statement in


advance. Why?

o In case the first runs are not so smooth.

o In case their emails get blocked, and in case the


company mail gets scrapped.

Understanding is one thing, throwing a wrench into the


spokes is quite another.

Another major consideration for legal assistance would


be the possibility of slowing down required business or sales.
Timelines and deadlines could be of major importance with
the company’s business and are of utmost importance.

Legal eagles will have to read, adjust, and approve the


contracts with the provider of the software. There might
need to be contracts with customers and clients separately.
Contract personnel and outside contracts will need to be

52 | P a g e
revised for appropriateness as well.

Finally, company protection from employees is an


important consideration in this process. What happens if the
employees refuse to follow along with the program? There
will have to be changes with the company policy and
procedures. There will have to be legal determinations with
noncompliance in writing.

53 | P a g e
Chapter Nine - Mapping Samples
The Spam software is installed; the employees have been
trained; now, it’s time for the real test.

Test the Spam


What is the real test? The real test is the everyday use
of the program with the everyday employees that will use
the program. The real test will be to see just how much
spam is captured incoming and how much is prevented from
being sent. This is really the part where you want to take
notice of the actual workings of the anti-spam software.

Remember earlier, it was recommended to update


immediately? That’s the first thing to be done. After a
program is developed and placed on the market, spammers
are working to find more and more ways to sneak through.
Also, the developers have worked to repair any glitches after
the installation by the consumers. Obviously, these issues
are not a part of the original software. Update the system
on each and every terminal – very important!

The next task would be to run a full scan. Perform the


scan on each and every terminal – once again, very
important! Take note of all the spam and adware
discovered. Then, the user should look at the vault or
quarantine program.

The following will give detailed measures to test and


monitor the software. Testing information can be used for
more than one purpose.

54 | P a g e
Organize the Test Data

Test Log Data. This should include different


measurable data findings:

9 Day, Date, Time of Update

9 Day, Date, Time of Each Scan.

9 Specifics about Spam found in vault

9 Specifics about email that should NOT be in the vault

9 Length of Scan

9 Glitches in scanning:
o Includes program issues
o Computer system issues
o Employee operation issues

9 Glitches in Updating Software:


o Includes program issues
o Computer system issues
o Employee operation issues

9 Glitches in day to day operations:


o Includes program issues
o Computer system issues
o Employee operation issues

9 Calls to In House Support:


o Includes nature of issues
o Response to the issues
o Final outcome
9 Record of Software Support Contact:
o Includes nature of issues
55 | P a g e
o Includes Response to Issues
o Final outcome

9 Evaluation and comments

Making Use of the Evaluation

This log should be done on a regularly scheduled basis.


Make sure these evaluations are performed and occasionally
perform an unscheduled scan.

After the initial installation, be sure to perform these


evaluations much more often.

Have printed material at each terminal so each user


can record day to day problems or concerns. Look for the
following:

9 Compare and Tally results of evaluation.

9 Is there a pattern noted?

9 Is a particular time more vulnerable to spam than


others?

9 Examine web sites visited.


o Determine whether Spam is found more often
after a site is visited.

9 Is the software sending too many needed emails to the


vault?
o Examine the keywords and program specifications.
o Relax the rules and specifications for incoming
email.

56 | P a g e
9 Is the program allowing too much Spam to go out?
o Examine the keywords and program specifications.
o Restructure the rules and specifications for
outgoing email.

9 What response is the in house support staff giving?


o Are the problems being resolved?
o Does it indicate further employee training is
needed?
o Is support easily accessible?

9 What response is the software support staff giving?


o Are the problems being resolved?
o Does it indicate further employee training needed
o Is the support easily accessible?

The evaluation log helps to see how effective the spam


software program is for the company. The tally sheet also is
a useful tool to present to the Board of Directors, Owners,
Financers as well as excellent orientation tools. This tool
can be extremely effective for use by the company.

Spam Testing For Real

The spam blocking program is installed and running.


Day to day operations are rolling right along. It’s time to
use the evaluation log for real test runs.

Schedule specific times for checking the software program in


action and thoroughly follow through with the scans.

9 Set these scan checks for various times


during a working day.
57 | P a g e
9 Set the scan checks for different days of
the week and different days of the month,
etc.

9 Set at least one scan close to a day when


many are paid such as the first when most
government employees are paid.

9 Schedule a scan around a holiday period, such as


Christmas

Select two secure terminals within the company to run


the first real test. Select several different terminals within
the company for regularly scheduled test scans. This
protects spam from delivery to customers and clients.

9 Send a sample of regular type email that is usually


received and comparable in volume per terminal.

9 Send a sample a sample of regular email usually sent


also with a comparable volume per terminal.

9 Submit a small number of emails with obvious spam.

9 Submit a small number of emails with the not so


obvious spam.
9 Increase the volume of each of these examples and
then overload the volume of emails.

9 Examine the vault for missed emails which should have


been received.

9 Examine the vault for dumping after each volume.

9 Check updates to ensure they were installed or just

58 | P a g e
downloaded.

9 Refine keywords, white lists and software specifics as


needed according to the percentage of forwarded spam
and captured email that should be acceptable.

Spies among Us

Next, test the effectiveness of the Spyware blocking


Program. The overall testing of the Spyware is similar for
the most part to testing of the Spam blocking program.
However, for re-enforcement and an easy list to run down,
the instructions will be repeated in a manner of speaking.
The Spyware blocking program must be working and usable.
The company is at risk when Spyware sneaks in the back
door. Since it’s not so easy to see and spot until it’s too late,
real and extensive damage can occur until it is secluded and
healed.

Remember earlier it was recommended to update


immediately? With the Spyware blocking program, that’s
the first thing to be done also. After a program is developed
and placed on the market thieves are working to find more
and more ways to sneak through. Also, the developers have
worked to repair any glitches after installation by the
consumers. Obviously, these issues are not a part of the
original software. Update the system on each and every
terminal as this is very essential in staying up to date.

The next task would be to run a full scan. Perform the


scan on each and every terminal. Take note of all the spy
ware and tracking cookies placed for cleaning. Then, the
user should look at the vault or quarantine program. Like
spam, the offenders are sent here, but are not necessarily
dealt with in the same manner. Depending where the threat

59 | P a g e
is found will determine the action the software program will
take.

The following will give detailed measures to test and


monitor the software.

Organize the Test Data

Test Log Data. This should include different


measurable data findings:

9 Day, Date, Time of Update.

9 Day, Date, Time of Each Scan.

9 Specifics about spyware found in vault.

9 Specifics about email that should NOT be in the vault.

9 Length of the Scan.

9 Glitches in scanning:
o Includes program issues
o Computer system issues
o Employee operation issues

9 Glitches in Updating Software:


o Includes program issues
o Computer system issues
o Employee operation issues

9 Glitches in day to day operations:


o Includes program issues
o Computer system issues
o Employee operation issues

60 | P a g e
9 Calls to In House Support:
o Includes nature of issues
o Response to the issues
o Final outcome

9 Record of Software Support Contact:


o Includes nature of issues
o Includes Response to Issues
o Final outcome

9 Evaluation and comments

Making Use of the Evaluation

This log should be done on a regularly scheduled basis.


Make sure these evaluations are performed and occasionally
perform an unscheduled scan.

After the initial installation, perform these evaluations


much more often.

Have printed material at each terminal so user can


record day to day problems or concerns. Look for the
following:

9 Compare and Tally results of evaluation.

9 Is there a pattern noted?

9 Is a particular time more vulnerable to threats and


invasion than others?

61 | P a g e
9 Examine web sites visited.
o Determine whether Spyware threats are found
more often after certain sites are visited.

9 Is the computer system running smoothly without


slowdown or shutdown?

9 Is the Spyware program preventing entry to needed


sites?

9 Can the user operate as usual such as downloading


necessary files or shared files?

9 What about sending files or uploading?


o Will the Spyware Program allow the user to send
out properly?

9 What response is the in house support staff giving?


o Are the problems being resolved?
o Does it indicate further employee training is
needed?
o Is support easily accessible?

9 What response is the software support staff giving?


o Are the problems being resolved?
o Does it indicate further employee training is
needed?
o Is the support easily accessible?

The evaluation log helps to see how effective the


spyware software program is for the company. The tally
sheet also is a useful tool to present to the Board of
Directors, Owners, Financers as well as for orientation tools.
This tool can be extremely effective for use by the company.

62 | P a g e
Spy Hunt

The Spyware blocking program is installed and running.


Day to day operations are rolling right along. It’s time to
use the evaluation log for real test runs.

Schedule specific times for checking the software


program in action and thoroughly follow through with the
scans.

9 Set these scan checks for various times


during a working day.

9 Set the scan checks for different days of


the week and different days of the month,
etc.

9 Set at least one scan close to a day when


many are paid such as the first when most
government employees are paid.

9 Schedule a scan around a holiday period, such as


Christmas

Select two secure terminals within the company to run


the first real test. Select several different terminals within
the company for regularly scheduled test scans. This
protects spam from delivery to customers and clients.

9 Use a sample of regular type files and downloads that


is usually received and comparable in volume per
terminal.

63 | P a g e
9 Take samples a regular uploads and sites usually sent
and visited. This also should be used with a
comparable volume per terminal.

9 Submit a small number of downloads, sites, or uploads


with obvious Spyware Threats.

9 Submit a small number of files, downloads, uploads or


sites with the not so obvious Spyware Threats.

9 Increase the volume of each of these examples, then


overload the volume of threats.

9 Examine the vault for missed files and downloads,


which should have been received.

9 Examine the vault for dumping after each volume.

9 Check updates to ensure they were installed or just


downloaded.

9 Refine keywords, white lists and software specifics as


needed according to the percentage of Spyware threats
found

9 After one scan is completed, run the scan again just to


check the amount not cleaned on the first pass.

o Does the program run smoothly or is it slow and


sluggish?

o Does the program freeze frequently?

64 | P a g e
Chapter Ten – Technical Realm
Day to Day Stuff
Everyday details are necessary. In this case, daily
maintenance may not be necessary, but regular
maintenance is most definitely a necessity. Start with the
top.

Spam Filters and Settings:

9 Evaluate the setting regularly.

9 Reset keywords.

9 Examine the increase in spam received.

9 Examine the increase of good email sent to vault.

9 Scan directories.

Add program software maintenance to the regular


defrag and browser maintenance schedule. This will help
the entire system run more effectively and efficiently.

Vaults or Quarantine:

Some programs have vaults, while some have quarantines.


It’s practically the same exact thing, just a different name.

9 Check the size of the program regularly

9 Check frequently the contents of the vault

9 Set alerts to notify when the vault is getting full.

65 | P a g e
9 Check for reasons vault is not getting full

The size of a quarantine folder or vault has various


indications. For instance: the larger the folder, the more
space that is used.

Other stories are told by the folder. If the size is


increasing quickly, then the filter settings need to be
relaxed. When this happens, more of the good stuff is
getting dumped into the spam folder. This will require more
frequent examination of the contents to retrieve what is
needed. This results in a reduction of efficiency as well as
revenue - a good reason to check the contents frequently.

Another factor for the size of the vault would be


automatic cleaning or dumping. Have you ever lost
something because the browser was too full or the memory
was full? When the folder is full, it simply can’t hold any
more. It overflows. This results in permanent loss of the
contents. While this might be preferred when speaking of
spam, what about the good stuff? The preferable email is
lost right along with the spam. Not a good thing. Of course,
the folder can be emptied manually; however, it is easier to
empty it on a regular basis. A setting can be applied to alert
the user when the folder is getting close to being full.

What do you do when a folder is not filling on a not-so-


regular basis? This means not too quickly. It means that
the settings need to be examined to increase its
effectiveness. It’s more likely that the settings are lacking in
performance than it is there is less spam being sent to the
mailbox. Examine and update the white list. Customers and
clients change names, new ones are added, products are
added and so forth and so on. As these changes occur, the
list needs to be changed as well. After all, protecting the

66 | P a g e
company client base is one of the major reasons for
installing the program.

The last maintenance tool that will be discussed here is


updates. Remember earlier in the book, it was
recommended to update immediately after installing.

The reason that updates are so essential is that


because after the software is developed and put into
production, changes in spam and spyware methods have
already improved. The weasels get better and better. The
developers have to accommodate for these new methods.

Also, after consumers begin to use the program,


“glitches” can appear. The developer has to repair these
glitches. The developers configure their own patch. This
takes us to operating system updates and patches. Once
again, the developers have to update their software to keep
up with these changes.

Updates are as essential to the software as the


software is to the company that uses the program. Without
the updates, the user is left wide open without protection.
Might as well and put an ad in the paper that reads,

“Wanted: Spammers and Spyware


to attack my business.”

Failing to update would make about as much sense.

67 | P a g e
Conclusion

Review of Systems

Each section of this tutorial deals with different aspects


of spam prevention then spyware protection. The book was
designed to take the company owner slowly through the
decision and selection process. In hopes that the wording
and meaning is clear and understandable, the company
official or owner will take this knowledge to help their
company and employees.

Spam and Spyware is a time consuming and costly


concern. Why do you need to be properly protected?

9 Employees are overburdened with the mountains of


spam which flows into the mailbox.

9 Productivity is slowed because the user has to sift


through all the email to look for legitimate
correspondence.

9 Clients and customer business is at risk because this


same legitimate email is accidentally deleted.

9 Unpleasant and costly legal consequences can arise


when spam is inadvertently forwarded.

9 Employees are embarrassed and insulted with intrusive,


obnoxious pornography that is included with much
spam emails.

9 Police investigation and possibly arrests can occur from


inadvertently forwarded pornography emails.
68 | P a g e
9 Employees are lured to sites and are not taking care of
company business.

9 Computer systems can be frozen, crashed, and


programs disabled from hidden spyware threats.

9 Sensitive company information can be obtained from


spyware threats.

9 Passwords and banking account information can be


retrieved with spyware methods.

9 Threatening and non-friendly tracking cookies tell the


“cat burglar” where, when, and how the user works
letting the thief know when, where, and how to strike.

9 Legal liability and costly legal action as a result of


spyware sent through employee and company
computers.

The adverse consequences from spam and spyware


threats can go on and on again. The originators of spam
and spyware constantly think of and devise newer and
cleverer methods to try and lure individuals and companies
out of their money. These con-artists and thieves are here
for one main reason and that is to get money. Your money.
Your company dollars. A few of these misguided attackers
just want to cause havoc with the company computer
system for no reason other than the fact that they can.

Each section of this book slowly builds and explains


how to select, manage, and operate spam and spyware
blocking applications. Checklists and step-by-step
considerations are provided for use. These steps and
checklists can be used “as is” or tailored to fit your

69 | P a g e
company’s needs.

Since it is apparent that spamming and spyware will


not be stopped, efforts to stop them from damaging your
company are required. This hopes to help the company do
just that: stop damaging threats, thefts and energy draining
methods out of your company. This hopes to help the
company fight the enemy and put them behind closed doors.
Outside the company doors. Outside the company play
yard. Out of your hair!

70 | P a g e

You might also like