What is wrong with the attached message below this courier error, or more likely, why does courier misparse this msg?
-- Dave Johnson [EMAIL PROTECTED] -----Original Message----- From: vnunet.com Bug Watch [mailto:[EMAIL PROTECTED]] Sent: Wednesday, December 18, 2002 11:23 AM To: [EMAIL PROTECTED] Subject: Bugwatch newsletter - The dangers of Russian Roulette CORRUPTED MESSAGE This is the Courier Mail Server 0.40 on imap. I received the following message for delivery to your address. Unfortunately, the sender's mail software did not properly format the following message according to Internet mail formatting protocols, and I can only deliver mail which has been properly formatted according to Internet standards. Instead of returning the following message as undeliverable, it is saved, in its original form, in the following attachment, which you can open with any editor or word processor. Please notify the original sender that their message was not properly formatted by their mail software. The specific mail protocol error in the original message is as follows: ------------------------------------------------------------------------ ----- The following message contains 8-bit content, but does not have the required MIME headers for 8-bit data transport. See <URL:ftp://ftp.isi.edu/in-notes/rfc2045.txt> for more information. ------------------------------------------------------------------------ ----- --- Original Message --- Received: from smtp.wangtrading.com (smtp.wangtrading.com [::ffff:192.168.11.11]) by imap with esmtp; Wed, 18 Dec 2002 11:28:31 -0500 Received: from out2smtp2.edc.dartmail.net (Not Verified[216.73.94.42]) by smtp.wangtrading.com with MailMarshal (v5,0,3,85) id <B0000000f8>; Wed, 18 Dec 2002 11:27:27 -0500 Received: from CORE1PUMP2 (unknown [10.50.11.70]) by out2smtp2.edc.dartmail.net (Postfix) with SMTP id F38EA543E1D for <[EMAIL PROTECTED]>; Wed, 18 Dec 2002 16:22:59 +0000 (GMT) Message-Id: <[EMAIL PROTECTED]> From: "vnunet.com Bug Watch" <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Subject: Bugwatch newsletter - The dangers of Russian Roulette Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Date: Wed, 18 Dec 2002 16:22:59 +0000 (GMT) Dear Subscriber Welcome to the Bugwatch newsletter from vnunet.com *************************** ADVERTISEMENT *************************** Download your free Teleworking report from Colt Click here now: http://mail.vnunet.com/cgi-bin1/flo?y=eFEe0CB1jW0EjN0B1Mz0A8 ********************************************************************* Security spending is on the rise but Christine Greenhalgh of BT Ignite, the telco's business services and solutions division, argues that, without an integrated approach to information risk assessment, much of this money could be wasted. European businesses are expected to spend 5.75bn euros (�3.68bn) on security in 2005, compared to 1.85bn euros (�1.18bn) in 2001, according to analyst IDC. But how much of this will actually prove effective in securing business? For information risk, all too often it is impossible to say because companies fail to carry out an assessment prior to their IT security implementation. As a result, businesses have no real way of knowing where their vulnerabilities lie, or where their investment should be focused, or indeed how to calculate the return on investment. Without ongoing information risk assessment, organisations are playing Russian Roulette with their own assets, and those of their customers and stakeholders. People can no longer afford either to bury their heads in the sand and ignore the threats, or to throw money at the problem without balancing the risk and return. Attitudes are changing as directors become more accountable for the risk to their information and corporate data, arguably a company's most valuable assets. It is important to take an holistic approach to information risk assessment. Start with looking at your key business processes and information assets. These can take a variety of forms, such as records of financial transactions, current or potential customer details, and management information. The operational impact of an information security breach is often an area overlooked by organisations, perhaps because of the difficulty of auditing and mapping the complex set of dependencies. There is a shortage of skilled people who can understand the issues of protecting an organisation's information assets and deploy appropriate cost-effective counter-measures. The next step is to think about the potential threats. When it comes to information security it is not enough simply to examine previous problems that you or others have encountered, and assess the threat based on how likely they are to happen again. Information risk can come from a number of different sources. Research by KPMG shows that, while hackers account for 52 per cent of security threats to e-commerce, poor policies account for 47 per cent, lack of awareness 38 per cent and weak products 30 per cent. In this era of online collaboration, as enterprises expose their perimeters to customers and business partners, it is also important to consider the threat of sharing information and connections with another organisation's network. Such close links can result in security collaboration and reduced risk, but may, on the other hand, increase the probability of a breach of security. So, both internal and external threats need to be assessed and even the most extreme and unexpected events considered. A couple of years ago few organisations would have included the risk posed by terrorists in an information risk assessment. Now it has to be considered. In fact, IDC predicts that there will be a major cyber-terrorism event in 2003. So, how do you decide how much to invest in protecting different information assets? Consider the effect of losing your central database of customer information. How long could you cope without it? How much time and effort and money do you spend in mitigating this risk? How much should you invest in contingency planning, incident response and handling the longer-term consequences? When you are clear about where to invest and how to respond, you can save time by running secure business operations based on a thorough security policy. Business decisions and the deployment of new networks or applications are streamlined as the organisation is not continually reinventing the wheel. And there is no point in spending twice as much as the data is actually worth to your business on protecting it. Risk assessment is work that is never finished. It is a dynamic process that depends on the regular assessment of the threat posed by new risks, and those introduced by new systems, organisations or business processes. All this can seem rather daunting, and certainly the ongoing management of information security requires highly diverse skills which may not be present in all businesses. As a result, companies are increasingly using trusted third parties to help with many aspects of information security, including risk assessment. An objective perspective, combined with a collaborative approach, can supplement existing skills and experience and simplify the process. By reducing an organisation's exposure to risk, such assessments play a vital part in safeguarding against the ultimate threat of business failure. *************************************** Security on vnunet.com: For the best news, features and products that might affect or enhance your business, visit: http://www.vnunet.com/Security For more stories plus an in-depth look behind the headlines, radio programmes, downloads and more, visit our website at: http://www.vnunet.com To comment on one of these stories, email us at: mailto:[EMAIL PROTECTED] Forums Post your comments online at the Security Forum here: http://www.vnunet.com/forums/forum.jsp?forum=5 Change your profile on vnunet.com: To change the number or nature of the newsletters you receive, or if you wish to unsubscribe, you can do so easily at: http://www.vnunet.com/Registration/login.jsp As this is the last Bugwatch of 2002, vnunet.com would like to take this opportunity of wishing all our subscribers a merry Christmas and a happy and prosperous new year. ######################################################### Note: This message is for the named person's use only. It may contain confidential, proprietary or legally privileged information. No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please immediately delete it and all copies of it from your system, destroy any hard copies of it and notify the sender. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. Wang Trading LLC and any of its subsidiaries each reserve the right to monitor all e-mail communications through its networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorized to state them to be the views of any such entity. ####################################################### ------------------------------------------------------- This SF.NET email is sponsored by: Order your Holiday Geek Presents Now! Green Lasers, Hip Geek T-Shirts, Remote Control Tanks, Caffeinated Soap, MP3 Players, XBox Games, Flying Saucers, WebCams, Smart Putty. T H I N K G E E K . C O M http://www.thinkgeek.com/sf/ _______________________________________________ courier-users mailing list [EMAIL PROTECTED] Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users
