Dave Taylor has been involved with the online world since 1980 and
is recognized globally as an expert on both technical and business
issues. He has been published over a thousand times, launched four Internet-related
startup companies, has written twenty business and technical books and holds both an MBA and MS Ed.
He's a columnist for the Boulder Daily Camera and
Linux Journal and frequently appears
in other publications both online and in print.
Additionally, Dave maintains four weblogs:
The Business Blog at Intuitive.com,
Ask Dave Taylor,
Dave On Film,
Based in beautiful Boulder, Colorado, Dave is an award-winning speaker, sought after conference and workshop participant and
frequent guest on radio and podcast programs, as well as active member of
his community and busy single father to three children.
Out, Damn Spam!
My backlog of books is getting out of control again, with two titles sitting on my desk, covers staring balefully at me while I ignore then, even with their "advance reader copy' lure. Eventually, I'll get to them.
Here's a taste of what he's writing about, his description of the fascinating and scary "social engineering" that we're all susceptible to from the hacker community:
Beware of Social Hackers
A so-called social hacker has one major goal: to get you to leak your computer system�s network user name and password. They target workers at companies, especially nonmanagement employees, who might not be too suspicious while trying to be nice to a telephone caller. A social hacker may identify himself or herself as another new-hire employee of the same company
working in the IT or some other department�someplace the real employee wouldn�t have a chance to know the staff.
Knowing that a lot of employees use children�s or pets� names for passwords, a social hacker will not only try to gain the trust of the hapless employee through casual conversation, but will ask questions about whether the employee has any kids or pets. Then, sharing bogus information about non-existent children and pets, the hacker asks what the employees� children�s names are. Within a few minutes, the hacker has enough information to log in to the company�s system and run amok.
If you follow the to-do list instructions [earlier in the book] about selecting and managing your passwords, and your dog�s name isn�t fR7o2D1o, the likelihood of an inadvertent slip drops to near zero."
I spend far more time each week dealing with spam than I'd like, and I have to say that if everyone just read through Danny's SpamWars book and followed his common sense guidelines for securing your computer and minimizing your spam, we'd all be much better off.
If you're an IT person, CIO, or someone else responsible for keeping the corporate mailboxes spam-free, then Spam Wars is a must-read.
Before you leave a comment, a tip: If you're interested in blogging, you should sign up for my Blogsmart News so you can stay up to date
on the latest insider tips and ideas for your Internet business and marketing
efforts. Sign up right now and you'll get a free copy
of my "Insider's Guide to Blogging" ebook too!