About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

What Is Email Spoofing?

Email spoofing is a specific type of cyber-attack where hackers manipulate and send emails to accounts, making them appear to be from legitimate sources. It falls under the umbrella of phishing or spam because hackers know that people are more likely to open an email if it comes from a trusted source. Occasionally these spoofed emails will ask recipients to provide sensitive data, such as passwords or financial information. Or the email may contain links that install malware on the recipient’s computer if clicked.

Hackers use email spoofing because it is an effective way to get around spam filters and blocked sender lists. By assuming the identity of a trusted sender, they are more likely to be successful in collecting sensitive information.

How Email Spoofing Works

Email spoofing is generally achieved using a Simple Mail Transfer Protocol (SMTP) on a generic email platform. The hacker composes an email in the usual way and then forges fields within the message header and address bars. When the recipient receives the email, it appears to come from the forged address. This works because the SMTP has no inbuilt way of authenticating addresses, and attempts to do so have not been widely adopted.

Hackers generally use addresses that are widely trusted. Spoofed messages will usually encourage recipients to take some action, such as clicking a link to prevent account suspension or changing a compromised password. This allows hackers the chance to harvest sensitive information. Other more sophisticated email spoofing tactics include targeting staff at financial institutions. In many cases, email spoofers will even use branding elements from official websites to make the emails seem more legitimate.

Why Businesses Need to Know About Email Spoofing

It is estimated that more than 3 billion spoofing emails are sent daily, with nine out of ten cyber-attacks starting with an email. Email spoofing is thought to have cost businesses worldwide around $26 billion since 2016. Many spoofing attacks purport to be from senior staff within the organization, which should be of particular concern for businesses due to the high levels of potential risk involved.

How To Tell If an Email Has Been Spoofed

Most legitimate organizations will not ask people to provide sensitive information via email. So, if an email is received asking to change a password or confirm account information, exercising caution is always a good idea. Recipients can open and use the email source code which will contain the original IP of the sender. It is also possible to use the Sender Policy Framework (SPF) included in many email providers’ security products. This authentication protocol may flag emails that have the potential to have been spoofed.

Best Ways to Protect Against Email Spoofing 

Businesses can prevent email spoofing in several ways, including:

  • Email security gateways

These block emails containing suspicious elements or ones that do not meet security protocols put in place by users.

  • Encryption

Businesses can set up encryption keys to ensure messages are only received from valid senders.

  • Anti-malware software

Some software programs can detect and block emails from suspicious senders or identify fraudulent attacks.

  • Better training

Effective security awareness training can help employees exercise caution and recognize suspicious elements. Training can use email spoofing examples and teach effective handling tactics – such as not clicking links or looking for the tell-tale signs of spoofing attacks. Training should ideally be held on a semi-regular basis to keep up to date with the latest spoofing methods and trends.

Contact Information:

Name: Michael Bertini
Email:michael.bertini@iquanti.com
Job Title: Consultant

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.