Navigating Email: From Spam Wars to Trusted Relationships

As I write this blog in June 2024, many government professionals, contractors, suppliers and even home users continue to complain that their inboxes are overflowing and/or out of control.
In extreme cases, I have seen friends and colleagues delete their entire email accounts and start over with a new one.
Others use various tools and tricks to find the important items.
Even when you follow the instructions contained in emails, frustrations do not end but often grow.
Or, when you answer an email to provide one of the three options given as to why you have not responded to the other four emails they sent in the past month, they don't leave you alone.
Rather, you feel as if you are almost the victim of online stalking as this person starts to send social media and/or phone messages.
What I mean by that is that private-sector employees are seeing just as many emails as public-sector employees.
Some may think generative artificial intelligence will come to the rescue, but GenAI is also being used to create and perfect these emails being sent, so a bit of an email battle is going on.
This is a hard question to answer, because no matter what proper etiquette is used by most email marketers, I do not have the time or desire to read and respond to what you are offering en masse.
I have a day job to do, and it is not to help you sell your latest whatever.
For example: Emails offering me awards will be deleted.
That being said, I do pay attention to people I really know, as well as companies I know and respect.
Send a genuine email from a real person who is verified.
Most unsolicited emails end up in the spam folder, but real relationships from trusted people are read and often addressed appropriately.
This means meeting real people at conferences, events, business meetings and other business situations prior to sending emails.
I am not going to fall for your mass-marketing technique 99.999 percent of the time.
As I have said in this blog and numerous times around the world at conferences, we need to build trust, and keep human trust in a zero-trust world.
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 02 Jun 2024 11:13:10 +0000


Cyber News related to Navigating Email: From Spam Wars to Trusted Relationships

How to report Gmail messages as spam to improve your life and make you a hero - At the same time, I've seen the continual rise of spam. We all know what spam is and nobody enjoys having to constantly sift through those unwanted emails to get to those we want to read. And yet so many simply delete spam from the inbox and think ...
5 months ago Zdnet.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
6 months ago Cybersecuritynews.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
4 months ago Securityzap.com
Navigating Email: From Spam Wars to Trusted Relationships - As I write this blog in June 2024, many government professionals, contractors, suppliers and even home users continue to complain that their inboxes are overflowing and/or out of control. In extreme cases, I have seen friends and colleagues delete ...
1 week ago Securityboulevard.com
'Wall of Flippers' detects Flipper Zero Bluetooth spam attacks - A new Python project called 'Wall of Flippers' detects Bluetooth spam attacks launched by Flipper Zero and Android devices. By detecting the attacks and identifying their origin, users can take targeted protection measures, and culprits can ...
5 months ago Bleepingcomputer.com
February 1, 2024: A Date All Email Senders Should Care About - For any organization sending bulk email or high email volumes to Google and Yahoo accounts, there's one date you should have flagged on your calendar. On February 1st, guidance indicates you'll need to pay attention if you are sending over 5000 ...
5 months ago Feedpress.me
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
6 months ago Itsecurityguru.org
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
6 months ago Itsecurityguru.org
Security Boulevard - With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as Google, Yahoo, and Microsoft have doubled their email security efforts. DMARC builds on two existing email authentication technologies: Sender Policy ...
4 months ago Securityboulevard.com
What is an email signature? - An email signature - or signature block or signature file - is the block of text that appears at the end of an email message that provides more information about the sender. This can include details such as the sender's full name, occupation or job ...
5 months ago Techtarget.com
Essential Email and Internet Safety Tips for College Students - Your email is one of the most important digital assets and identities because it helps you create accounts on other platforms. Securing your email requires you to pay attention to your passwords, gadgets, and the links you engage with. The places you ...
4 months ago Securityboulevard.com
Flipper Zero can now spam Android, Windows users with Bluetooth alerts - A custom Flipper Zero firmware called 'Xtreme' has added a new feature to perform Bluetooth spam attacks on Android and Windows devices. A security researcher previously demonstrated the technique against Apple iOS devices, inspiring others to ...
6 months ago Bleepingcomputer.com
98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis - The digital supply chain is probably more extensive and more complicated than you realize. Upward of 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years - and these figures are ...
1 year ago Securityweek.com
How to Encrypt Emails in Outlook? - If you are sending out a confidential email and are scared of its content getting tampered with in transit, then you should learn how to encrypt an email in Outlook. As of 2023, the global email encryption market size is USD 6.2 billion, which is ...
5 months ago Securityboulevard.com
Flipper Zero Bluetooth spam attacks ported to new Android app - Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of devices to implement these annoying spam alerts. Inspired by previous research on the topic and Flipper Zero applets targeting iOS ...
6 months ago Bleepingcomputer.com
If you prepare, a data security incident will not cause an existential crisis - This happens when there's a lack of preparation, but we can all choose to take actionable steps to turn down the temperature during incident response and help others and ourselves re-frame the issue. Those who have built trusted internal and external ...
5 months ago Helpnetsecurity.com
Mozilla decides Trusted Types is a worthy security feature The Register - Mozilla last week revised its position on a web security technology called Trusted Types, which it has decided to implement in its Firefox browser. The browser biz will help reduce a longstanding form of web attack that relies on injected code. ...
5 months ago Go.theregister.com
Mozilla decides Trusted Types is a worthy security feature The Register - Mozilla last week revised its position on a web security technology called Trusted Types, which it has decided to implement in its Firefox browser. The browser biz will help reduce a longstanding form of web attack that relies on injected code. ...
5 months ago Packetstormsecurity.com
Spotlight: Silvereye Technologies and Perception Point key sponsors at Acronis' Sales Kickoff - During the week of Feb 6th, over 200 of the Acronis Global Sales Leadership Team will gather in Sofia, Bulgaria, to kick off 2023. This year, the annual sales meeting will be sponsored by two Acronis strategic partners: Silvereye Technologies and ...
1 year ago Acronis.com
Pikabot Malware Surfaces As Qakbot Replacement for Black Basta Attacks - A threat actor associated with Black Basta ransomware attacks has been wielding a new loader similar to the notoriously hard-to-kill Qakbot, in a widespread phishing campaign aimed at gaining entry to organization networks for further malicious ...
5 months ago Darkreading.com
Top 10 Email Security Solutions and Programs for 2023 - When you are reading this article, you should already be aware of the importance of email security. It is essential for businesses to have a security solution in place to protect against phishing, spam, and malware-based attacks. These attacks can ...
1 year ago Cybersecuritynews.com
Bitdefender Email Protection identifies potentially dangerous content in webmail - Bitdefender launched Email Protection, a new feature that scans and identifies potentially dangerous content such as phishing attempts and online scams, in webmail accessed from any device. Email Protection allows users to extend one of the world's ...
4 months ago Helpnetsecurity.com
Navigating the New Age of Cybersecurity Enforcement - Many equate this move as akin to a bomb going off for people working in the CISO role. CISOs are now faced with unprecedented potential liability risks, prompting the need for a proactive approach to legal exposure for security executives. To shed ...
5 months ago Darkreading.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
4 months ago Gbhackers.com
DocuSign scam targeted more than 10,000 inboxes: report - Scammers used a malicious DocuSign document in a campaign that tried to steal credentials belonging to more than 10,000 people across several organizations. Researchers at cybersecurity company Armorblox said the brand impersonation campaign targeted ...
1 year ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)