Navigating Email: From Spam Wars to Trusted Relationships

As I write this blog in June 2024, many government professionals, contractors, suppliers and even home users continue to complain that their inboxes are overflowing and/or out of control.
In extreme cases, I have seen friends and colleagues delete their entire email accounts and start over with a new one.
Others use various tools and tricks to find the important items.
Even when you follow the instructions contained in emails, frustrations do not end but often grow.
Or, when you answer an email to provide one of the three options given as to why you have not responded to the other four emails they sent in the past month, they don't leave you alone.
Rather, you feel as if you are almost the victim of online stalking as this person starts to send social media and/or phone messages.
What I mean by that is that private-sector employees are seeing just as many emails as public-sector employees.
Some may think generative artificial intelligence will come to the rescue, but GenAI is also being used to create and perfect these emails being sent, so a bit of an email battle is going on.
This is a hard question to answer, because no matter what proper etiquette is used by most email marketers, I do not have the time or desire to read and respond to what you are offering en masse.
I have a day job to do, and it is not to help you sell your latest whatever.
For example: Emails offering me awards will be deleted.
That being said, I do pay attention to people I really know, as well as companies I know and respect.
Send a genuine email from a real person who is verified.
Most unsolicited emails end up in the spam folder, but real relationships from trusted people are read and often addressed appropriately.
This means meeting real people at conferences, events, business meetings and other business situations prior to sending emails.
I am not going to fall for your mass-marketing technique 99.999 percent of the time.
As I have said in this blog and numerous times around the world at conferences, we need to build trust, and keep human trust in a zero-trust world.
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.


This Cyber News was published on securityboulevard.com. Publication date: Sun, 02 Jun 2024 11:13:10 +0000


Cyber News related to Navigating Email: From Spam Wars to Trusted Relationships

10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
1 year ago Cybersecuritynews.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
1 year ago Esecurityplanet.com
10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
7 months ago Cybersecuritynews.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
2 years ago Cybersecuritynews.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
2 years ago Securityzap.com
Navigating Email: From Spam Wars to Trusted Relationships - As I write this blog in June 2024, many government professionals, contractors, suppliers and even home users continue to complain that their inboxes are overflowing and/or out of control. In extreme cases, I have seen friends and colleagues delete ...
1 year ago Securityboulevard.com
'Wall of Flippers' detects Flipper Zero Bluetooth spam attacks - A new Python project called 'Wall of Flippers' detects Bluetooth spam attacks launched by Flipper Zero and Android devices. By detecting the attacks and identifying their origin, users can take targeted protection measures, and culprits can ...
2 years ago Bleepingcomputer.com
Microsoft fixes machine learning bug flagging Adobe emails as spam - In August 2024, it also mitigated an Exchange Online bug that tagged emails containing images as malicious and sent them to quarantine automatically, while in October 2023, it had to disable a bad anti-spam rule that was flooding Microsoft 365 ...
10 months ago Bleepingcomputer.com
Microsoft fixes Exchange Online bug flagging Gmail emails as spam - In a final update to the incident report added on May 1 at 16:31 UTC, Microsoft said it successfully reverted the buggy ML model to the previous working version, mitigating the false positive issue. It also added that admins and users may have ...
10 months ago Bleepingcomputer.com
February 1, 2024: A Date All Email Senders Should Care About - For any organization sending bulk email or high email volumes to Google and Yahoo accounts, there's one date you should have flagged on your calendar. On February 1st, guidance indicates you'll need to pay attention if you are sending over 5000 ...
2 years ago Feedpress.me
Flipper Zero can now spam Android, Windows users with Bluetooth alerts - A custom Flipper Zero firmware called 'Xtreme' has added a new feature to perform Bluetooth spam attacks on Android and Windows devices. A security researcher previously demonstrated the technique against Apple iOS devices, inspiring others to ...
2 years ago Bleepingcomputer.com
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
2 years ago Itsecurityguru.org
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
2 years ago Itsecurityguru.org
Security Boulevard - With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as Google, Yahoo, and Microsoft have doubled their email security efforts. DMARC builds on two existing email authentication technologies: Sender Policy ...
2 years ago Securityboulevard.com
What is an email signature? - An email signature - or signature block or signature file - is the block of text that appears at the end of an email message that provides more information about the sender. This can include details such as the sender's full name, occupation or job ...
2 years ago Techtarget.com
Essential Email and Internet Safety Tips for College Students - Your email is one of the most important digital assets and identities because it helps you create accounts on other platforms. Securing your email requires you to pay attention to your passwords, gadgets, and the links you engage with. The places you ...
2 years ago Securityboulevard.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
1 year ago Bleepingcomputer.com
Hackers Weaponize Amazon Simple Email Service (SES) for Phishing and Spam Campaigns - Cybersecurity researchers have uncovered a new wave of attacks where hackers are exploiting Amazon Simple Email Service (SES) to launch sophisticated phishing and spam campaigns. Amazon SES, a cloud-based email sending service designed for businesses ...
5 months ago Cybersecuritynews.com
Flipper Zero Bluetooth spam attacks ported to new Android app - Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of devices to implement these annoying spam alerts. Inspired by previous research on the topic and Flipper Zero applets targeting iOS ...
2 years ago Bleepingcomputer.com Rocke
98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis - The digital supply chain is probably more extensive and more complicated than you realize. Upward of 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years - and these figures are ...
3 years ago Securityweek.com
How to Encrypt Emails in Outlook? - If you are sending out a confidential email and are scared of its content getting tampered with in transit, then you should learn how to encrypt an email in Outlook. As of 2023, the global email encryption market size is USD 6.2 billion, which is ...
2 years ago Securityboulevard.com
If you prepare, a data security incident will not cause an existential crisis - This happens when there's a lack of preparation, but we can all choose to take actionable steps to turn down the temperature during incident response and help others and ourselves re-frame the issue. Those who have built trusted internal and external ...
2 years ago Helpnetsecurity.com
Staying Ahead Of The Curve With A Temporary Email Address - Using a site like is a good step as they’re on the forefront of innovation, have excellent reviews, don’t store your data and essentially give you just the service you want: a temporary email without the strings attached. A temporary ...
7 months ago Cybersecuritynews.com
AkiraBot Spammed 80,000 Websites by Employing CAPTCHA Bypass & Network Evasion Techniques - A sophisticated Python framework dubbed “AkiraBot” has successfully targeted more than 80,000 websites since September 2024, using advanced techniques to bypass security measures and deliver AI-generated spam. The researchers noted the ...
10 months ago Cybersecuritynews.com Akira
Hackers Leveraging Email Input Fields to Exploit Vulnerabilities - However, their prevalence and the complexity of email address formats make them a frequent target for attackers seeking to bypass weak validation and inject malicious payloads. Security researcher coffinxp states that attackers may register or submit ...
10 months ago Cybersecuritynews.com