spam

Results 126 - 150 of 206Sort Results By: Published Date | Title | Company Name
Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox
    
Gold Lasso
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
    
McAfee
Published By: ClickMail Marketing     Published Date: Jun 03, 2009
Whether you're in the market for a new ESP now or want to see how your current one stacks up, you'll find this whitepaper an invaluable resource. This whitepaper will help you take a thoughtful, informed approach to your ESP selection or comparison to your existing solution, so you can compare apples-to-oranges and still make a wise choice.
Tags : 
email service provider, esp, clickmail, roi, dma, direct marketing association, deliverability, marketing channel
    
ClickMail Marketing
Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam
    
Astaro
Published By: EmailDirect     Published Date: Nov 12, 2009
Insider information pertaining to deliverability changes affecting email sent to Yahoo, Hotmail, AOL and Gmail. Find out how authentication, domain reputation and user engagement metrics will affect your email delivery in 2010. It's not all about your IP's anymore!
Tags : 
emaildirect, email marketing, emarketing, gmail, yahoo, aol, deliverability, email
    
EmailDirect
Published By: Symantec     Published Date: Aug 09, 2013
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Learn more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
Black Lotus
Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
Palo Alto Networks
Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing
    
UnsubCentral
Published By: eDataSource     Published Date: Jan 05, 2015
Download this white paper today and learn about the key features of Inbox Tracker 2.0 and how it uses real time data from your customers to tell you if they received your communication. This solution is not only more accurate than traditional seed based monitoring when it comes to inbox delivery, but a solution that allows you to react immediately to any fluctuation in your inbox delivery as it happens.
Tags : 
real-time inbox monitoring, email monitoring, real time data, delivery rates
    
eDataSource
Published By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : 
messagelabs, email security, web security, virus, spam, spyware, phishing
    
MessageLabs
Published By: MessageLabs     Published Date: Jul 16, 2009
This White Paper explains what image spam is and how it tries to escape detection. But it also describes how the filter provided by MessageLabs hosted services uses subtle clues to expose image spam - and so delivers a cost-effective solution to what can be an irritating and business-compromising problem. Learn more today!
Tags : 
messagelabs, threats, spam, image spam
    
MessageLabs
Published By: Thawte     Published Date: Oct 06, 2015
The cost of cybercrime in the UK has reached a staggering £27bn – but what’s the actual threat to your business? From data breaches, phishing and spam, to identity theft, malware and vulnerabilities - learn how they can damage your business and the steps you can take to protect yourself.
Tags : 
cybercrime, business threats, phishing and spam, identity theft
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
40% der deutschen Unternehmen sind in den vergangenen zwei Jahren Opfer von Internetkriminalität geworden. Doch wie genau wird Ihr Unternehmen bedroht? Von Datenlecks, Phishing und Spam bis hin zu Identitätsdiebstahl, Malware und Schwachstellen: Informieren Sie sich über die möglichen Auswirkungen dieser Bedrohungen auf Ihr Unternehmen und geeignete Schutzmaßnahmen in unserem neuen Leitfaden von Thawte.
Tags : 
cybercrime, business threats, phishing and spam, identity theft
    
Thawte
Published By: Thawte     Published Date: Oct 06, 2015
Au Royaume-Uni, le coût de la cybercriminalité a atteint le chiffre record de 27 milliards de livres. Mais quelle est la menace réelle pour votre entreprise? Violations de données, usurpation d’identité, phishing, spams, malwares, vulnérabilités... découvrez l’ampleur du risque et les mesures à prendre pour vous protéger.
Tags : 
cybercrime, business threats, phishing and spam, identity theft
    
Thawte
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Our analysis shows 25% of internet bandwidth can be lost to employee misuse, streaming media & spam. Understand bandwidth wastage in your business & steps you can take to control it.
Tags : 
messagelabs symantec, internet bandwidth, it management, tco, bandwidth management, network management, total cost of ownership
    
MessageLabs Ltd.
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware
    
MessageLabs Ltd.
Published By: Oracle     Published Date: Sep 30, 2014
Authentication. Whitelists. Spam complaints. Metrics. Ensuring email deliverability is harder than it sounds in today’s complex technical landscape. Make sure your team has all the nitty-gritty know-how you need to get your best messages into inboxes – and to protect your sender reputation.
Tags : 
oracle, marketing, cloud, connected, customer, modern, sales, sites visited
    
Oracle
Published By: Marketo     Published Date: Oct 17, 2016
A great email helps you engage your customer and deliver your message, which can make a difference between a click-through and a direct route to your website or losing a customer’s interest and being sent to the spam folder. As consumers become increasingly savvy about all types of communications—from mobile to social to email—email, for example think about Gmail’s tabbed inbox where users can filter and organize their inboxes. It is becoming even more difficult to stay front and center. Download now to learn more!
Tags : 
email marketing, email blasts. electronic marketing
    
Marketo
Published By: DATAbuddy     Published Date: Apr 27, 2009
Thousands of companies already leveraged the power of email marketing to promote their business to a wide range of customers. For those businesses that haven't yet introduced email marketing into their advertising efforts - and even for some of those who have - the strategy does reveal some challenges. Companies struggling to get the most out of their email marketing efforts should consider using a managed email marketing service. Let's take a look at the challenges of email marketing and how an outside firm can tackle those issues.
Tags : 
databuddy, email marketing, e-mail, email, email campaign, outside agency, smb, small business
    
DATAbuddy
Published By: TRUSTe     Published Date: Sep 16, 2009
Put yourself in the customer's shoes: when shopping online, what are the things that worry you most? Before you enter your name and email address do you think about spam clogging your inbox? If you are like most consumers, you check to see if the site bears the seal of a third-party verification program and if the site has a privacy policy.
Tags : 
truste, cheapflights, customer confidence, privacy policy, adsense, email privacy, opt-in, newsletter
    
TRUSTe
Published By: GeoTrust     Published Date: Aug 09, 2013
Do you know if you or your customers are being sent phishing emails? Others may be trying to acquire information and by taking the first step to reading this white paper may just help stop any kind of phishing.
Tags : 
nethawk, geotrust, web security, web threats, ssl, secure sockets layer, technology, solution
    
GeoTrust
Published By: GetActive Software     Published Date: Jan 23, 2007
Nonprofit organizations of all sizes are facing considerable challenges as they reach out to their supporters using email. Learn how to overcome these challenges and connect with your customer with a minimum of filtering and blocking.
Tags : 
email marketing, deliverability
    
GetActive Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.