SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Spam protection for companies and households

Spam protection for companies and households
17.03.2025

Ruslan Rakhmetov, Security Vision


We've already talked about the types of unwanted mailings and the risks they bring with them. Spam is difficult to avoid completely, but it can be significantly reduced. Therefore, in this article we will look at ways to protect yourself and various tricks that will help you protect yourself.


There are three levels of protection: prevention, filtering and safe behaviour.

   1. Do not publish your contacts in the public domain, do not leave your email and phone number on forums, in social networks and comments, and if you need to specify your email on a website, replace @ with [at] (for example, example[at]mail.com), so that automatic bots do not recognise it. Use disposable emails and virtual numbers for SMS (e.g. Google Voice, TextNow), and for registrations on dodgy sites you can create a temporary email through services like TempMail or Mailinator. You can also create a separate email for subscriptions and purchases, and use the main email only for important matters. Use unique passwords for different services, because if your email leaks from one database, it should not lead to the hacking of other accounts.


   2. Enable anti-spam filters in your mail, mark unwanted emails as "spam" (this is how the mail service learns and blocks such emails in the future), set up blacklists and use mail services with good protection (ProtonMail and Tutanota pay more attention to security than mass services), and services like Unroll.Me help you unsubscribe from unnecessary mailings.


   3. Do not click on links in suspicious emails. If a bank or shop asks you to confirm something, it is better to go to the site manually through your browser, rather than clicking on a link from an email. Check the sender, because official companies write from corporate addresses (@bank.com, not @bank-security.net) - if the sender's email is suspicious (e.g.support@paypal-secure.ru instead ofsupport@paypal.com ), it's probably a scam. Do not download attached files from strangers (especially if they are .exe, .zip, .docm, .pdf - they may contain viruses and scripts that run processes on your device). Use two-factor authentication (2FA).


Check if your address has leaked (you can use the free service Have I Been Pwned to check for leaks), change your email if spam cannot be stopped and remember: the state is the guarantor of your safety, in Russia you can file a complaint with Roskomnadzor.


The usual defence methods (filters, blacklists) work well, but if you want extra security, you can use tricks to avoid spam and even confuse spammers:


- Plus-addressing (tagged email)

If your email service supports plus-addressing (Gmail, Outlook, ProtonMail), you can add any word to the + address: Instead ofexample@gmail.com , use example+shop@gmail.com for purchases, example+news@gmail.com for news. If at some point spam to example+shop@gmail.com , it means that the shop has leaked your email and it can be blocked.


- Subdomains in email (if you have your own domain)

If you have your own domain (e.g. mydomain.com), you can create emails using the template: bank@mydomain.com,social@mydomain.com , etc. If one of them gets into the spam database, it is easy to disable it.


- Reverse spammer trap

Some services allow you to set up an autoresponder that tells the sender that the email does not exist. Spammers can remove your address from the database if they see such a message.


- Virtual numbers

To avoid giving your real number on websites, you can use services like Twilio, Google Voice, Receive-SMS and FreePhoneNum, which is also used by developers.

If the site allows you to register with a wrong number, try changing one digit. If you still receive a confirmation code, it means that the site does not verify the reality of the number, and you can enter a random number.


- Blacklists and false answers

If spammers are constantly calling, you can set up an answering machine like "the number is no longer in service", you can use a voice answering machine or record a short message on your phone to do this. You can also subscribe to an email service that automatically sends spammers false emails confirming that the email does not exist (e.g. MailWasher).


- Hiding the number in messengers

In many messengers you can hide your number and show only your nickname instead. For example, in Telegram you can use your ID instead of your number (@yourusername).

On social media, set up filtering so that only friends or verified contacts can post.


- Use of "empty" profiles

If a social network requires a phone number or email, you can create a fake profile with a temporary email. Using a unique email for each social network to track leaks is time-consuming, but can protect those who are particularly privacy-conscious.


If the site asks for personal data unnecessarily, you can enter fictitious data. For example, if you need to enter an address, you can enter Lenin Street 1 (or another common address).


These techniques will help you avoid spam and protect your personal data. The main rule is not to give out your contacts unnecessarily and use security tools. If spam is already happening, filter it, use false responses and change your approach to registering on sites.


Spam is used to steal employee credentials, which can lead to the leakage of confidential information, and attached files and links in spam emails can contain viruses, trojans and encryption tools that can paralyse a company's operations.


Keeping activity logs and analysing anomalous employee activity related to corporate email and blocking phishing attacks prevents data leaks and potential fines for non-compliance with GDPR, PCI DSS, ISO 27001. Reducing the amount of time employees spend dealing with spam increases productivity. Reducing the risk of malware infection reduces data and infrastructure recovery costs.


Spam increases financial risks (email compromise can lead to the substitution of payment details, fraud and financial losses) and IT infrastructure overload (mass spam attacks can block the work of mail servers and employees). There are also reputational risks - if attackers gain access to corporate contacts, they can use them to send spam on behalf of the company.


Various technological measures can be used to protect companies. For example, implementing corporate anti-spam filters (Proofpoint, Mimecast, Microsoft Defender for Office 365, Cisco Email Security), using DMARC, DKIM, SPF to protect the corporate domain from spoofing and sending spam on behalf of the company, and separating corporate email addresses into security levels (e.g., public contacts for clients are separated from internal emails).


Since responding to spam is a well-researched area, the processes are fairly easy to automate, for example by setting up spam detection and blocking through SIEM systems, SOAR for more automation and machine learning.


Effective protection involves not only technology, but also organisational measures and human training. Regular penetration tests can be conducted to assess the resistance of employees to social attacks, while monitoring corporate email leaks via Dark Web scanning (SpyCloud, Have I Been Pwned, DeHashed) will allow you to detect the threat in time.


In today's digital world, spam is not just an annoyance, but a cybercriminal tool that carries serious financial and reputational risks. Companies must implement multi-layered protection, combining technological solutions, organisational measures and continuous threat monitoring. 

Recommended

What skills a SOC specialist should master
What skills a SOC specialist should master
Comparative review: Shodan, ZoomEye, Netlas, Censys, FOFA and Criminal IP. Part 1
Comparative review: Shodan, ZoomEye, Netlas, Censys, FOFA and Criminal IP. Part 1
ARP spoofing (ARP spoofing, ARP poisoning): what it is
ARP spoofing (ARP spoofing, ARP poisoning): what it is
IT asset management
IT asset management
CyBOK. Chapter 2: Risk Management and IS Governance. Part 1.
CyBOK. Chapter 2: Risk Management and IS Governance. Part 1.
Incident investigation and use of specialised tools
Incident investigation and use of specialised tools
No - code development and ML assistants are the next generation of SOC analyst tools
No - code development and ML assistants are the next generation of SOC analyst tools
Browser fingerprint - what is it
Browser fingerprint - what is it
Protecting data and media from viruses and hacking
Protecting data and media from viruses and hacking
How AI tools work in cybersecurity
How AI tools work in cybersecurity
Capabilities of the updated Security Vision KII product
Capabilities of the updated Security Vision KII product
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities

Recommended

What skills a SOC specialist should master
What skills a SOC specialist should master
Comparative review: Shodan, ZoomEye, Netlas, Censys, FOFA and Criminal IP. Part 1
Comparative review: Shodan, ZoomEye, Netlas, Censys, FOFA and Criminal IP. Part 1
ARP spoofing (ARP spoofing, ARP poisoning): what it is
ARP spoofing (ARP spoofing, ARP poisoning): what it is
IT asset management
IT asset management
CyBOK. Chapter 2: Risk Management and IS Governance. Part 1.
CyBOK. Chapter 2: Risk Management and IS Governance. Part 1.
Incident investigation and use of specialised tools
Incident investigation and use of specialised tools
No - code development and ML assistants are the next generation of SOC analyst tools
No - code development and ML assistants are the next generation of SOC analyst tools
Browser fingerprint - what is it
Browser fingerprint - what is it
Protecting data and media from viruses and hacking
Protecting data and media from viruses and hacking
How AI tools work in cybersecurity
How AI tools work in cybersecurity
Capabilities of the updated Security Vision KII product
Capabilities of the updated Security Vision KII product
The process of finding, analysing and assessing vulnerabilities
The process of finding, analysing and assessing vulnerabilities