Story image

​Huge increase in email-borne attacks requires new thinking

19 Feb 18

Email has become the absolute foundation of modern business communications and operations.

A recent study from the Radicati Group found that the total volume of sent and received emails around the world was more than 205 billion, with that number forecast to increase by at least 5 percent every year – something hackers are keenly aware of.

SonicWall says that as the sheer volume of email increases, so too does the amount of ransomware, phishing, business email compromise (BEC), spoofing, spam and virus attacks. Email offers hackers the perfect vehicle to deliver these malicious vulnerabilities.

If that hasn’t got you on your toes, government regulations like GDPR now hold your business responsible for protecting confidential data which means businesses must ensure the secure exchange of emails that contain sensitive customer data and confidential information – or face the hefty consequences.

And then there’s the issue of email continuity. Given email is the pillar to which modern business stands on, an email outage can be crippling and in some cases bring business to an abrupt halt.

In light of this, SonicWall has provided an insightful report that delves into common email-borne threats to detail why advanced threats demand advanced email security.

Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.