Dos & Don'ts: Securing e-mail systems

Want to keep your e-mail systems safe from hacker attacks and spam? Here are a few tips from Stalker Software president and CEO Vladimir Butenko.

Stalker Software president and CEO Vladimir Butenko shares a few tips for protecting e-mail systems from unsolicited mail and hacker attacks.

Do limit the number of concurrent connections from a single incoming IP address -- Spammers and hackers alike will often attempt to disrupt a system by sending or bombarding the system with requests, all coming from the same IP address. This will help to prevent such intrusions.

Do limit the number of failures from a single IP -- Spammers trying to relay or to submit messages to a dictionary of addresses on a server will generate errors. If you can limit the number of failures (errors) that is acceptable before blocking the IP, this is ideal.

Do use good RBL's -- You can prevent a lot of spam from getting to your users by doing some research and figuring out which real-time blackhole lists are the most effective.

Do report known spammers -- If you discover someone is sending unsolicited e-mail, be sure to report them. This is what makes RBL's more effective.

Don't be a spam relay -- Be sure that when the mail system is configured as a closed relay. If not, you are part of the problem and shortly your server will end up blacklisted.

Don't let your users' addresses be overexposed -- prevent, to the extent you can, your users' e-mail address exposure on the Internet. Or in the very least warn them that the more their e-mail address is used on the Internet, the more likely they are to be the victims of spammers.

Don't let your users become spammers -- Monitor your user base. If they start to send unsolicited messages, your server could end up blacklisted.

This Content Component encountered an error

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchDataCenter

SearchServerVirtualization

SearchCloudComputing

SearchEnterpriseDesktop

Close