Archive for March, 2016

Privacy and Security News and Tips 20160330

Protecting your Personally Identifiable Information

When you think about all of the accounts we have online and the number of information leaks, think about how often you reuse the same username or worse, password.

Share

Privacy and Security News and Tips 20160322

Protecting your Personally Identifiable Information

Encryption; its use, weaknesses, and the stigma that gets attached by those that do not understand its intrinsic value is forefront in the news and my mind.

Share

Privacy and Security News and Tips 20160315

Protecting your Personally Identifiable Information

This week I want you to think about how vulnerable you are when you are in public. When you go to a restaurant, bar, or even a class, think about what others are looking at and noticing.

Share

What Is SPAM And How Not To Be A SPAMMER

Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.

Share

Privacy and Security News and Tips 20160308

Protecting your Personally Identifiable Information

Everything you share should be planned out and not be compromising to your privacy and security if you can help it.

Share

What Are Email Blacklists

ATTOG Technologies spam stops here image

A DNS-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming. It is a “blacklist” of locations on the Internet reputed to send email spam.

Share

What Is Email Spoofing

ATTOG Technologies What is Spoofing image

Email spoofing is the creation of email messages with a forged sender address. It is easy to do because the core protocols do not have any mechanism for authentication. Spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.

Share

Understanding Domain-based Message Authentication, Reporting and Conformance (DMARC)

ATTOG Technologies dmarc email auth flowchart

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email validation system designed to detect and prevent email spoofing.

Share

Understanding DomainKeys Identified Mail (DKIM)

ATTOG Technologies DomainKeys Identified Mail (DKIM) diagram

DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain is authorized by that domain’s administrators.

Share

Understanding Sender Policy Framework (SPF)

ATTOG Technologies SPF diagram image

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain’s administrators.

Share

Privacy and Security News and Tips 20160301

Protecting your Personally Identifiable Information

All business be they physical or virtual want to know who their customers are and how they shop. This is evident by the abundance of membership cards, signup sheets, and surveys conducted after a purchase.

Share