Email Security / Anti-Spam
Email security refers to the collective measures used to secure the access and content of an email account or service. It allows an individual or organization to protect the overall access to one or more email addresses/accounts. An email service provider implements email security to secure subscriber email accounts and data from hackers – at rest and in transit.
Email security is a broad term that encompasses multiple techniques used to secure an email service. From an individual/end user standpoint, proactive email security measures include: “Strong passwords, Password rotations, Spam filters”. Desktop-based anti-virus/anti-spam applications. Similarly, a service provider ensures email security by using strong password and access control mechanisms on an email server; encrypting and digitally signing email messages when in the inbox or in transit to or from a subscriber email address. It also implements firewall and software-based spam filtering applications to restrict unsolicited, untrustworthy and malicious email messages from delivery to a user’s inbox.
Anti-spam refers to services and solutions that focus on blocking and mitigating the effects of illegal emails – or spam – on email users. To achieve this objective, different types of anti-spam systems have been integrated with the email systems of many email and Internet service providers (ISP).
Modern anti-spam technology covers a broad spectrum of filters, scanners and other types of applications. Some anti-spam services work from a statistical method, while others use heuristics or predictive algorithms. To sort email in sophisticated ways, anti-spam service providers may monitor email signatures, IP addresses or other data, which reduces spam. The emergence of anti-spam software adds to the ongoing conflict between email recipients and unsolicited email senders. ISPs and email providers are working to secure legislative victories that could block certain types of email marketing. However, senders may find ways to shield a message’s origins, or imitate another sender’s signature or other email features. Likewise, senders may find ways to combat anti-spam tool algorithms and break through filters to reach email users.