80% of Companies Unknowingly Send Spam80% of Companies Unknowingly Send Spam
Email traffic from individual organizations has over 80% of their sent mail sent from IP addresses outside of their domain
June 19, 2007
TORONTO -- News Facts:
BorderWare Technologies today announced that its real-time, multi-application reputation service, BorderWare Security Network (BSN), reported that email traffic from individual organizations has over 80% of their sent mail sent from IP addresses outside of their domain.
This means that legitimate organizations are being incorrectly being labeled as spammers causing emails to be blocked unbeknownst to them.
The BSN Portal tracks domain reputation in real time. Want to check your reputation? Enter your domain (ex. xxx.com) in the upper right corner of the screen.
BSN also features a Global Threat Map and a Threat Dashboard that shows where the worst threats are coming from and features ‘top 10 lists’ including the worst offenders and top spammers.
Background for BSN:
BSN works by conducting ongoing, real-time reputation analysis of the content sent from IPs, domains and users across multiple applications– email, web, IM and VoIP.
As BSN detects potentially compromised or infected traffic – based on more than 30 metrics established by BorderWare – individual domain or user behaviors are flagged, graded and rejected, ensuring that legitimate traffic can be sent and received without delay while compromised traffic is rejected.
Traditional reputation systems, focused primarily on email, simply base their reputation score on the traffic monitored from an IP address. However, many businesses and individuals today utilize service provider or hosted mail systems that share an IP address with many domains, which leads to an inaccurate assessment of their reputation.
BorderWare also provides “Google-style” Alerts for BSN, a new proactive notification system that lets visitors register their IP addresses on the site and be notified if any issues are found by BSN that cause concern.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Modernize your Security Operations with Human-Machine Intelligence
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums