fbpx Skip to main content

Spring Cleaning Your Spam Filter Whitelist

By May 20, 2019Security
Spring Cleaning Your Spam Filter WhiteList

It’s time to add your spam filter whitelist to your spring cleaning routine.

For some of us who have been using the same spam filter for years, we may have a long list of allowed addresses or domains. Because phishing email is involved in 91% of breaches, I can’t stress enough how important it is to manage your whitelist.

As security has evolved, I continually find things that I did months or years ago that I would do differently today. So, I am learning to go back and review the things that are on autopilot to make sure they meet my current standards.

On spam filters – and many other things, for that matter – we all get in a hurry sometimes. So we make broad changes just to make sure that email gets through. Maybe you had 2 or 3 emails blocked from Gmail, so you decided to allow all of gmail.com through the filter. While you got those emails through, you increased your risk of getting malicious emails.

Why revisit and clean up your whitelist?

It’s the unintended consequences that get us many times.

With the increase in spoofed email addresses that appear to come from a CEO or co-worker, it is important to make sure that you have not whitelisted your own domain. And this is more common than you think. You may have your newsletter sent from an outside firm or other applications that do not send through your email server that need to come in. The easy answer is to allow entire domains, but rarely (if ever) is it the right choice. In many cases , whitelists are a free pass through your email security system.

There are typically 2 levels of whitelisting to be aware of. First is the global level, which your IT company or IT administrator needs to review. Then there is your personal whitelist that you can clean up yourself. Both are important to review.

I encourage you to take some time this week to clean up your whitelist and improve your email security. You may be surprised at what you find!

 

This article was authored by Ryan Pieken, Sr. Consultant CIO / CISO Services.


Recent Posts / View All Posts

Disaster Recovery

Importance of a Reliable Disaster Recovery Plan for Your Business

| Email, Managed Services, Security | No Comments
Running a business is not always a smooth-sailing operation. There are often things that could go wrong regardless of how cautious you are or how hard you abide by the so-called rules. Because of this, you should have a good backup and disaster recovery plan in case a disaster happens, like an accident or a cyberattack. There are plenty of BDR solutions for different businesses. You must find the one that fits your needs and will protect your network and data in the best way possible. Understanding Backup Disaster Recovery All businesses deal with important information, like details about transactions,…
Social Media Phishing

Quiz Time: Can You Handle Social Media Phishing Attacks at work?

| Managed Services, Security | No Comments
Our last three blogs have discussed cybersecurity threats and how they affect a business. We have talked about the dangers that stem from various types of malware. We have warned you about the newest cybersecurity risks expected to wreak havoc on businesses soon. And in the face of the ongoing growing acceptance of remote work setups, we have delved into the threats related to working from home. Now, we will now talk about social media phishing. The common thing in all these topics is that they are all linked to phishing. A strong phishing attack can make a network open…
Risks of Working from Home

Addressing the Cybersecurity Risks of Working from Home

| Business Productivity, Managed Services, Security, Tech Tip | No Comments
A remote workforce has become the norm since the pandemic. Even now that we consider it safe to return to office work, many businesses have maintained the remote work setup because of the advantages. However, the risks of working from home also bring issues that need attention so as not to risk the company’s network and data. What Are the Cybersecurity Risks That Come with Working from Home? There are risks when working from home. Workers lack the usual protective measures used in an office network. Many workers use their home networks and may also use the same device for…