Let’s Talk About Spam – Wrapping It All Up

Welcome to the last in our series on talking about spam to end users. We’ve spent the past several weeks talking about spam, phishing, and malware; how to recognize it; how to protect ourselves from it; and we’ve done so using what I hope was a minimum of technical jargon or geek speak. The ideal behind this series was to either provide our technical readers with a blueprint they could use to speak to their non-technical friends, family, and coworkers about spam, or to give them something they could point these people to so they could read it on their own. Let’s review what we have covered in the past several weeks.

Here’s a run down on the posts that make up our series on talking about spam.

Let’s Talk About Spam – Our introduction to this series set the stage for admin and end user alike.

Let’s Talk About Spam – Spam, Phishing and Malware – Here we go over each of the big bad three-how they are similar, how they differ, and just what they can do to you.

Let’s Talk About Spam – Why Should I Care? – Far too many home users think malware and phishing are just attacks against businesses. Here we set the record straight so they understand just why everyone needs to care.

Let’s Talk About Spam – How to Identify Spam – Seasoned professionals can spot spam by the third word in the subject. With what we cover in this post, end users will have a better idea of what stands out in spam.

Let’s Talk About Spam – The Worst Offenders – Playing off the previous article, we provide some examples here of actual spam, phishing, and malware to help drive home the previous lesson.

Let’s Talk About Spam – FUD – In this article we discuss fear, uncertainty, and doubt and how spammers and scammers play upon human nature to try to scare you into reading their emails, opening their attachments, and visiting their websites.

Let’s Talk About Spam – Identifying Suspicious Links – Once again playing off the previous, here we look at links in emails to help you recognize dangerous links for what they really are.

Let’s Talk About Spam – Personal Information – Personal information is exactly that, and in this post we discuss why you should think twice before giving it out.

Let’s Talk About Spam – To Unsubscribe or To Ignore? – We try to answer the age old question here, and help you determine when to click the unsubscribe link or just the delete key.

Let’s Talk About Spam – Reporting Spam – While there is no spam fighting army on the Internet, in this post we discuss what some of the major services do when you report spam to them.

Let’s Talk About Spam – Do You Really Want To Do That? – Back on the idea of personal information, and how readily some folks will give out their email address, we discuss the pros and cons of this, and offer some suggestions for alternatives.

Let’s Talk About Spam – Ways To Protect Yourself – With a better understanding of spam, phishing, and malware, and how to identify them all, reader should now have a better appreciation of just why they actually need good antivirus software, should user d/ls, not forward emails blindly, and why a throwaway account might be a good thing to have.

Let’s Talk About Spam – What to Do when You’ve Done the Unthinkable – Accidents happen, and even when you understand the threats, you can make a mistake. Here we talk about how to hand those oops moments.

And then finally, this post to wrap it all up. You might just want to book mark this one, since it contains links to all the rest, so the next time a friend, family member, coworker, or stranger on the street asks you about spam and what they can do about it, you can point them to this one site and send them on their merry way. By the time they read through the entire series, they should have all the information they need.

For those of you who have stuck with this series from beginning to end, thank you. I hope you found this useful. With this series done, I find myself needing to come up with the next round of articles. If you have any ideas for another series, or a set of topics you wish we would cover here at AllSpammedUp, please leave a comment and let me know what you would like to see. If I can cover it, and my editor approves, you might just spawn the next series. Thanks in advance for your suggestions or requests.

Written by Casper Manes

I currently work as a Senior Messaging Consultant for one of the premier consulting firms in the world, I cut my teeth on Exchange 5.0, and have worked with every version of Microsoft’s awesome email package since then, as well as MHS, Sendmail, and MailEnable systems. I've written dozens of articles on behalf of my past employers, their partners, and others, and I finally decided to embrace blogging and social media, so please follow me on Twitter @caspermanes if you enjoy my posts.

0 Comments

  1. Ethel Pines · July 28, 2012

    Thank you! I follow the series, and wrapping it up makes it easier for me to thread the whole series. Wrapping it up makes it easier for me to pass on the message, too.

    This is actually quite useful for HR professionals and trainers to create a module in the discussion on less-risky online behaviour or for IT professionals to simply pass on to their users so they are reminded to be more responsible in using the net.
    It’s discussed relatively simple, as well, that my teenage son can very well understand. It is not just adults who need to be oriented. A huge number of online users are adolescents.

Leave A Reply