E-mail Blind Copy (Bcc) Addresses Are Secure

BY STANLEY ZAROWIN

Key to Instructions

To help readers follow the instructions in this article, we used two different typefaces:

Boldface type is used to identify the names of icons, agendas and URLs.

Sans serif type shows the names of files and the names of commands and instructions that users should type into the computer.


Can a spammer grab the addresses off an e-mail’s blind copy (Bcc)? Several people in my office insist it can be done.

Rest assured, the claim of insecurity is a legend that pops up from time to time. You can confirm its safety by sending yourself an e-mail (see screenshot below) and include yourself as a Cc (copy) and a Bcc (blind copy).

When it arrives, it looks like this:

When you send a message, names and addresses in the Bcc are automatically stripped out by the sending server (usually the Internet Service Provider) after they are transmitted so they are never available to the recipients.

SPONSORED REPORT

Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.

QUIZ

News quiz: IRS warning on cyberattacks and a change in pension rules

Once again, the IRS sounds the alarm about a threat from cyberthieves. See how much you know about this and other recent news with this short quiz.

CHECKLIST

Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.