dcsimg

Methods Used to Deal with Outbound Spam

1 | 2 | 3 | 4 | 5

Methods Used to Deal with Outbound Spam

  • 1 | 2 | 3 | 4 | 5

Spam is one of those things that most IT organizations think they have under relative control. Of course, no one really stops to think about why there is so much spam in the first place.

Well, it turns out that far too many Internet service providers are relying on anti-spam software that was primarily designed to fight inbound, rather than outbound, spam. According to a survey of 100 IT professionals working for ISPs that was conducted by Osterman Research on behalf of Commtouch, a provider of anti-spam software to software vendors, 40 percent report that IP addresses managed by them have been blacklisted at some time in the last 12 months. (Read more about this survey from our Mike Vizard over at his blog.)

The use of inbound spam tools to fight outbound spam makes it relatively simple for spammers to tinker with their content until they see what makes it through the spam filters. They can do this because once they take over an account, they can also sign up as a customer to see what makes it through.

With 80 percent of all e-mail on the Internet classified as spam, huge amounts of IT resources are being diverted to stem a tide of spam that by all rights shouldn't be there in the first place.