sb-eu logo
Story image

Email: The often ignored factor in strong cybersecurity

27 Feb 2018

With the rise of ‘cool’ new corporate chat applications like Slack, Microsoft Teams and Workplace by Facebook, email, that dependable but unsexy workhorse of business communication, is often low priority for IT teams allocating resources and budget.

However, despite these new applications, email remains the lifeblood of every organisation. Because of its importance, and the information it carries, email is a major target for cybercriminals looking to attack an organisation and its people.

According to the Verizon Data Breach Investigation Report, 65 per cent of malware infections linked to data breaches were installed via malicious email attachments. The same report found that seven per cent of users were successfully phished.

In some industries, the rate was even higher, with 13 per cent of users in manufacturing phished, and 10 per cent in healthcare. That statistic means that in a 1000-person-strong company, 100 users are going to open a malicious email and potentially click on a link that could lead to a data breach.

While email can be an attack vector used to gain access to sensitive corporate data via phishing or impersonation attacks (a type of phishing scam that targets high profile users like CEOs and CFOs), it’s also a valuable asset on its own to attackers.

The reason is that email usually contains personal information, which can be used for identity theft, or to launch a phishing attack. A customer-facing organisation will receive hundreds, if not thousands of emails every day, each one containing personal identifiers.

On top of that, internal corporate email communications contain personal information about both the sender and the recipient including their names, title and other data like phone numbers and Twitter handles.

Each of those emails don’t just disappear into the ether once it’s been dealt with, either. For various reasons, including regulatory requirements or for better customer service, email will usually be kept in an archive for months, if not forever.

That’s why it’s absolutely critical to protect both email resources as they are sent and received, as well as the archives those emails will live in. Emails are a treasure trove for attackers, and need to be guarded appropriately.

Unfortunately, email archives are one of the last things that a corporate security operation thinks about. There is a distinct lack of understanding about what can be lost in an email archive hack.

Cybercriminals are after more than just money. Corporate data, intellectual property, employee credentials and customer information can all be profitable to an attacker. A business that loses its email archives is looking at a whole lot more than just lost revenue and unplanned downtime.

With many organisations moving to Microsoft Office 365 or Google’s G-Suite, it’s easy to assume the built-in protections provided by those platforms are enough, and that their cloud archiving services will fully protect collected emails in perpetuity. That’s not the case.

 There are still significant volumes of phishing, impersonation attacks, and other emails containing malicious content.

A Mimecast Email Security Risk Assessment inspected 55 million emails that were passed by other security tools – and the results are astounding. More than 12 million – or close to a quarter – of the emails were in fact deemed ‘bad’. It found 12.5 million spam emails, 9,000 dangerous file types, 2,500 malware attachments and 19,000 impersonation attacks.

What these tests demonstrate is that email is an attack vector, and that incumbent security systems aren’t good enough at preventing an attack. So, what should organisations do?  

The answer for organisations wanting to maintain a strong cyber resilience posture is to employ a cloud-based email security solution. Look for a solution that provides protection against ransomware, phishing and impersonation attacks, as well as cloud archiving and email continuity.

However, while cloud email security solutions offer a rapid means of improving data protection, they are just one part of the bigger picture. A truly effective cyber resilience regime also requires protection of other parts of the enterprise.

Companies wanting to adopt best practices should look to the Australian Signals Directorate’s Essential Eight and Top 4 guidelines, which include patch management and application whitelisting, among other pointers.

The introduction of Australia's Notifiable Data Breaches (NDB) scheme in February is an added impetus for organisations to get their email houses in order. The legislation has provisions for penalties of up to $1.8 million for non-compliance.

In addition to those penalties, there are also the reputational consequences of experiencing a data breach. Any organisation that loses emails will have to deal with customers taking their business elsewhere. The costs of not securing email and email archives are simply too high to ignore.

Article by Mimecast’s director of security product management, Steve Malone.

Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
Is cyber deception the latest SOC 'game changer'?
Cyber deception reduces data breach costs by more than 51% and Security Operations Centre (SOC) inefficiencies by 32%, according to a new research report by Attivo Networks and Kevin Fiscus of Deceptive Defense.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Strong cybersecurity posture crucial for company success - Fortinet
"They should also conduct due diligence to ensure partners aren’t inadvertently creating vulnerabilities with insufficient cybersecurity measures."More
Story image
How security awareness training can safeguard companies from cyber-attacks
Training goes a long way in embedding a culture of cybersecurity compliance within the company.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More