[MlMt] Follow Up to Email Concerns
Bill Cole
mmlist-20120120 at billmail.scconsult.com
Thu Jul 8 15:09:06 EDT 2021
On 2021-07-08 at 11:53:26 UTC-0400 (Thu, 8 Jul 2021 11:53:26 -0400)
Dan Pritts <mailmate at lists.freron.com>
is rumored to have said:
> This is veering WAY off topic, but I’m curious that for only 2k
> users you find it effective to run your own email.
That mail system is not a standalone service. It's a legacy service that
isn't marketed at all, but we will continue to run it as long as we have
customers (all small and medium-sized businesses) who don't want to
leave. It used to be much larger but there has been a lot of customer
migration to MS (and to Google but then also to MS.) Keeping it
operational is not a huge amount of work and the customers who've stuck
around have done so because they appreciate the level of service that
the giant providers cannot offer. We also fill the mail admin role for
some of those migrated customers, so I'm speaking of that capability
difference from direct experience. Microsoft can't do what we do.
> Having done it myself for years I can’t imagine diving back in
> unless it was a full time thing.
My primary employer does much more than email, so I have no difficulty
staying busy.
Of course, I should add that I also run my own personal mail system for
myself and my family: 5 people who pay me not a penny for my work.
That's all about being extremely picky about my own personal email and
professionally needing a system with a live mail stream including
substantial would-be spam (if spam is never accepted, was it ever really
spam?) where I can test anti-spam tooling with minimal risk and no legal
issues.
>> On Jun 29, 2021, at 12:37 PM, Bill Cole
>> <mmlist-20120120 at billmail.scconsult.com> wrote:
>>
>> I help manage email systems that see unceasing attempts to break into
>> accounts, often using username+password combinations leaked by other
>> systems. At any point in time, one smallish mail system I work with
>> (~2k users) will have dozens of attack sources temporarily blocked at
>> the network level by automated tools that can detect some careless
>> authentication attacks. The simple fact that the Bad Guys find this
>> sort of attack to be worth mounting is enough for me to know that it
>> is worth mitigating, even if I were not aware of how exactly they use
>> compromised accounts. Unfortunately, due to users ignoring vehement
>> advice about password re-use, I have seen the impact that email
>> compromise can have on both businesses and on individual lives.
>
> _______________________________________________
> mailmate mailing list
> mailmate at lists.freron.com
> https://lists.freron.com/listinfo/mailmate
--
Bill Cole
bill at scconsult.com or billcole at apache.org
(AKA @grumpybozo and many *@billmail.scconsult.com addresses)
Not Currently Available For Hire
More information about the mailmate
mailing list