Diagrams the four major types of companies involved in the application service provider market and how they relate to the end-user
This report explains why e-mail-borne viruses are such a threat, describes trade-offs that organizations must understand and use when formulating plans, and offers specific recommendations that will help them
The problems posed by e-mail-borne viruses to Microsoft-based systems and strategies to help reduce the risks to reasonable levels
The danger is posed by a lack of understanding of the threat, and the existence of scripting engines and e-mail automation APIs on client PCs
The four underlying trade-offs one needs to understand before formulating strategies to combat e-mail viruses
Strategies for preventing a virus from ever getting on to a system, avoiding activation of a virus that does make it on to a system, limiting the permanent damage an activated virus can do, and preventing the virus from reproducing and spreading
The six points on a network where measures should be taken to protected against e-mail-borne viruses
Technologies that will help combat e-mail viruses in the future, such as public key infrastructures and digital signatures
Issued in response to the recent "LoveBug" virus, the patch for Outlook 98 and Outlook 2000 blocks many types of file attachments and restricts Outlook's programming interfaces