Tuesday, June 12, 2012

DMARC Email Authentication Standard Adoption

Return Path Launches Industry's Largest ISP Anti-Phishing Program with AOL, Libero, Microsoft, Synacor, UOL and Yahoo!

World's Largest Program Accelerates DMARC Email Authentication Standard Adoption, Protects ISPs and Their Customers Against Phishing Attacks While Improving Trust in Email



 Return Path, the world's leading email certification and reputation monitoring company, today launched the world's largest ISP Anti-Phishing Program which includes AOL, Libero, Microsoft, Synacor, UOL and Yahoo!. Return Path's ISP Anti-Phishing Program enables ISPs around the world to adopt the new DMARC email authentication standard more quickly, protect their customers against phishing attacks, protect their own brand against spear phishing and improve overall trust in email as a communication channel. Return Path's ISP Anti-Phishing Program, free of charge to ISPs, was announced at the M(3)AAWG 25th General Meeting held June 5-7, 2012 in Berlin, Germany.
"Return Path's ISP Anti-Phishing Program underscores our long standing, deep relationships with the world's leading ISPs and is squarely aimed at eliminating consumer targeted phishing attacks," said Matt Blumberg, CEO at Return Path. "There isn't a day that goes by in which we don't hear or read about a leading brand getting hijacked, and each time it happens it erodes trust in the email channel. By working together, Return Path and its ISP partners can effectively combat domain phishing and help ensure a trusted, secure email ecosystem."
"Synacor enables our ISP customers to offer their end-consumers an email environment everyone can trust," said Eric Toczek, Director of Email, Synacor, Inc. "The adoption and use of DMARC plays a key role in that ability, providing a mechanism that can be used to protect mailboxes from many domain phishing attacks. Syancor is excited be part of the Return Path ISP Program to help drive adoption of DMARC and provide consumers a safer and more secure email environment."
Return Path's ISP Anti-Phishing Program
Companies who are part of the Return Path ISP Anti-Phishing Program have access to a global team of email experts who can assist them with handling un-authenticated email, generating feedback reports to domain owners on email that don't pass authentication, reducing domain spoofing and the impact of phishing and fraudulent email messages delivered to end-users.
As the global leader in email certification solutions trusted by more than 2,500 top brands, Return Path leverages its extensive network and relationships with more than 70 of the world's largest ISPs, receiving data on more phishing attacks than any other industry player, covering over 2.2 billion inboxes. Return Path's ISP Anti-Phishing Program provides the widest breadth and depth of visibility into ISPs' outbound email authentication practices and includes: 

-- Email Authentication and DMARC deployment assistance, implementation guides and primers
-- Assistance with authentication report generation on both inbound/outbound emails
-- ISP brand protection against spear phishing - Return Path helps ISPs implement outbound email authentication combined with in-bound DMARC policy enforcement to help prevent spear phishing of their own brand.
-- Protection of ISP Customers against the effect of phishing attacks
-- Improved Trust in the Email Platform 

Return Path Industry Affiliations
Return Path is a board member and sponsor of the Messaging, Malware and Mobile Anti-Abuse Working Group (M(3)AAWG), a steering committee and board member of the Online Trust Alliance (OTA), a founding member of DMARC.org and a member of the Anti-Phishing Work Group (APWG). The company is a contributing author to email authentication open standards and is at the forefront of protecting users and ISPs against fraudulent email with its Domain Assurance, anti-phishing solution. M(3)AAWG recently announced the appointment of Christine Borgia, Senior Director, Email Intelligence Group, Return Path as a Collaboration Committee Chair and Sam Masiello, CSO of Return Path as a Training Committee chair. Return Path will be presenting several sessions at the M(3)AAWG Summit 2012.
To learn more about Return Path's ISP Program, please visit: http://www.returnpath.net/internetserviceprovider/dmarc/
About Return Path
Return Path makes email work better by scoring and certifying email senders from around the world. We help marketers, publishers and other large-volume email senders increase their response rates by providing the world's leading inbox deliverability solution. We help mailbox providers and email administrators at ISPs and enterprises block unwelcome and malicious email by providing near real-time IP reputation scores and other data-driven tools. Taken as a whole, these tools and services improve the consumer experience of email by protecting them from spam, phishing and other abuse. Return Path offers free access to Sender Score, the email reputation measure compiled through our cooperative data network of ISPs and other email receivers, at our reputation portal: www.senderscore.org .


Friday, June 8, 2012

Take charge of your online reputation

Take charge of your online reputation

Take charge of your online reputation

Chances are you already have an online reputation, even if you do not know it.
On the Internet, you create an image of yourself through the information you share in blogs, comments, tweets, snapshots, videos, and links. Others add their own opinions (good or bad), which contribute to your reputation.
Anyone can find this information and use it to make judgments about you. Microsoft commissioned research in Canada, Germany, Ireland, Spain, and the United States, and found that while 91 percent of people have done something to manage their online profile at some point, only 44 percent of adults actively think about the long-term consequences of their online activities.
Watch a video about how to protect and control your online image.
What does your online image project about you?
View a presentation of the survey's findings or download the executive summary (PDF).

Find out what is on the Internet about you

Use search engines

Type your first and last name into several popular search engines. Search for images as well as text.
Be specific to increase your search effectiveness. Put quotation marks around your name. Specify the city where you live, your employer, or other keywords that apply only to you.
Avoid searching for national identity numbers or Social Security numbers. If you happen to see these (or other sensitive data like credit card numbers, grades, or health information) in search results, ask the website owner to remove the data immediately.
Search all variations of your name. If you have ever used a different name or nickname, if you use your middle name or initial, or if your name is frequently misspelled, check these as well. Include personal domain names (for example, yourname.com) in your search.
Check sites you frequent. Search online directories and sites that compile public records, genealogy sites, the websites of organizations to which you belong or donate time or money, and the like.

Search blogs and social networks

Review what others have posted about you in comments, pictures, or videos. Explore their blogs, personal pages on social networking sites (Facebook, LinkedIn, Twitter), or photo-sharing sites like Flickr and Instagram. (Parts of these sites are inaccessible to many search engines, so you must look separately.)

Evaluate your online reputation

After you have gathered this information, think about the story it tells. Does it reflect the way you want others to perceive you? If not, what is missing? Is it accurate? If not, what should be deleted or corrected? Do you need more than one online profile—whether professional, personal, or for an area of interest, like a hobby or volunteer work? If so, is it okay to mix information from different profiles? Do you want your profiles to be public or more private?
Your answers to these questions are important because information online is searchable, often permanent, and may be seen by anyone on the Internet.
Unlike data stored on paper, online information can be aggregated by Internet search engines and other tools, which makes it easier for others to put together their own idea of who you are. Websites may archive what you have posted and data they have collected from you. Friends (or ex-friends) may divulge it; malicious programmers and security lapses may expose it.

Protect your online reputation

Act online in a manner that reflects the reputation you want to earn—whether you are building on an existing reputation, discarding an old persona, or creating a new one.

Think before you share

Before you put anything online, think about what you are posting, who you are sharing it with, and how this will reflect on your reputation. Would you be comfortable if others saw it? Or saw it ten years from now?
When you choose photos and videos, think about how others might perceive them.
Talk with your friends about what you do and do not want shared. Ask them to remove anything that you do not want disclosed.

Treat others as you would like to be treated

Be civil in what you say and show on the web.
Respect the reputation and privacy of others when you post anything about them (including pictures) on your own pages or on others' pages or public sites. Remove anything that does not honor this.

Stay vigilant about what the Internet is saying about you

Sign up for personal alerts. Some search engines will automatically notify you of any new mention of your name or other personal information.
From time to time, search for yourself to see what additional information has been catalogued in search engines.
Periodically reassess who has access to your pages. Friends change over time; it is okay to remove those who no longer belong.

Polish your professional reputation

Publish positive information about yourself

To be your online best, create what you want others to see. Link anything you publish to your name.
Join a professional network such as LinkedIn or CareerBuilder. Put together a robust profile and make connections with colleagues there. Ask for recommendations from those who know your work well.
Comment on professionally-oriented blogs, participate in online forums, and review books on subjects in which you have expertise.
Start a blog or register a website in your own name.
  • Publicize yourself through clear writing, straightforward design, and high quality images.
  • Write regularly (at least twice a month) on a subject about which you are knowledgeable.
  • Invite visitors to make comments to create a conversation.

Consider separating professional and personal profiles

Use different email addresses, screen names, blogs, and websites for each profile.
Do not link your real name (or sensitive personal information such as your home and email addresses, phone numbers, or photos) with other profiles that you create.
Add personal information to your professional profile judiciously and only as it reflects well on that image. Avoid cross references to personal sites.
Some social networks let you build separate friends lists—for family, your sports team, work, and so on—so that you can manage what you share within one profile.
Look for Settings or Options to help you manage who can see your profile or photos, how people can search for you, who can make comments, and how to block unwanted access by others.

Restore your online reputation

If you find information about yourself that does not fit the reputation you want, act quickly. The longer it stays public, the greater the chance that it will be spread or archived.
In a respectful way, ask the person who posted it to remove it or correct an error. If it is a correction, ask him or her to include a notice (CORRECTION or UPDATED) right next to the original (incorrect) material.
If the person does not respond or refuses to help, ask the website administrator to remove the digital damage.
If you feel a public correction is necessary, present your case simply and politely without attacking the person.
.