Spam may be cheap for the people who send it, but it can be a serious expense for your business. According to a study conducted earlier this year by Nucleus Research Inc., spam management costs U.S. businesses more than $71 billion annually in lost productivity — $712 per employee.
Here's a quick look at the various ways that spam drains your company's bank account and how you can calculate the real cost to your business.
Anti-Spam Technology: Spam-fighting products and services are a big business, and anti-spam vendors aren't generating their revenue from the people sending junk email. Most companies not only spend thousands of dollars on anti-spam software and hardware solutions, but they also drop cash on employees and consultants to plan, deploy and maintain the technologies.
Lost Productivity: Spam wastes employees' time. The average employee spends 16 seconds reviewing and deleting each spam message, according to Nucleus Research. The company estimates that at businesses that quarantine spam (where junk messages are placed in a directory for review and confirmation by recipients), each user spends an average of 4.5 minutes per week reviewing messages. Deleting messages, however, turns out to be the most expensive spam strategy. The average employee at companies that delete spam messages loses an average of 7.3 minutes per week looking for lost legitimate messages.
Wasted Storage: Companies that quarantine spam must add extra storage capacity to accommodate suspicious mail so that users can review it at their leisure. But many users never bother to review their quarantined messages, so the email just sits there, consuming storage space and money.
Internet Service Cost Pass-Alongs: This number is difficult to calculate. Still, it would be naive to believe that ISPs aren't passing along junk email's tremendous costs to their customers. In an October 2007 report, anti-spam software vendor Symantec Corp . estimated that 70 percent of all email was spam. The traffic burden created by junk email forces ISPs to add extra network and server capacity, as well as to install their own anti-spam solutions.
An Intangible Cost: Spam has a broader economic impact as well, hitting many businesses and nations that are least able to bear the burden. Consider Nigeria, for example. Nucleus Research noted that while fraud and corruption have been rampant in Nigeria for some time, the country may be forever kept in the digital darkness because of the volume of deceptive email sent by local spammers. The research firm noted that most spam filters block any mail with "Nigeria" in the title or text, effectively keeping anyone communicating with, from, to or about Nigeria from doing it via email.
Your Cost: If you're interested in seeing just how much spam is costing your business, use Computer Mail Services Inc.'s spam-cost calculator . For a second opinion, check out the Sendio spam-cost calculator .
Other spam-cost calculators are available at NetworkWorld.com , Network Computing and Commtouch .
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more