Emails from Cloud Server – Part 2

Practically Speaking About Cloud Computing:

SPAM, the root cause:

We learn that some companies have left cloud servers because of this email sending problem. Quite natural, because this is one of the important requirement from web sites or web applications! When this is not done, the whole purpose of the site gets defeated. So the concern is genuine. So, for us Cloud Technical Professionals, there is need to delve in to this problem. The root cause is SPAM. In the year 2010 it is reported that 107 trillion emails were sent at the rate 300 billion emails per day. Only about 11 percent of it was not Spam. 89% was spam. There are acts and regulations as protection. CAN-SPAM Protection Act from FTC is one of them.

CAN-SPAM Act:

The main requirements of the CAN-SPAM Act:

  • No false or misleading information including header and routing; originating domain and email is must be accurate.
  • No deceptive subject line.
  • You must disclose clearly that it is advt. mail.
  • Message must have valid location address.
  • Message must have info. On how user can opt out of this mail list-unsubscribe.
  • Opt out requests should be honored promptly.
  • Even if another marketing agency sends mail, the company on behalf it sent is responsible.

Each violation is subject to penalties up to $ 16000. The act further defines transactional email and commercial email. In addition to acts like this, there are Real Time Blacklist (RBL) Organizations like Spamhaus.

RBL:

There are various Blacklists databases and organizations each having their own techniques and methodologies to achieve the purpose. Spamhaus is one of the international organizations whose service includes blacklists and white lists. Many internet networks use Spamhaus service and an estimated 80 billion emails per day are captured by it as spam. SORBS or Spam and Open Relay Blocking system is another blacklist. A lot of email servers rely on these RBLs or real time blacklists. Once an IP address is listed in these blacklists databases, the digital world rejects the mails from them as spam.

Cloud an enabler of spam?

We do know that a lot of spam mail originates from compromised PCs called botnets or zombies. Next to these botnets, cloud accounts as the major culprit for sending mass mails. Anyone with credit card can rent the cloud machines and make them as their servers. With cloud service provider’s static ip address, these hosts are used to send bulk mail. This affects cloud hosting service provider’s reputation. Because of this situation, we can not entirely blame the blacklists maintainers. As such it is a Tom and Jerry like tricky situation between cloud service providers and the blacklists organizations chasing each other!

Let us see how a third party ESP can help in this situation, in Part III of this article.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…