sb-eu logo
Story image

Report reveals 80% increase in email impersonation attacks

30 Aug 2018

Email and data security company Mimecast has announced the availability of its latest quarterly Email Security Risk Assessment (ESRA), an aggregated report of tests that measure the efficacy of widely used email security systems.

A Mimecast ESRA helps participating organisations better understand the number and type of email-borne threats that are getting through their current defences.

As part of the cumulative assessments, Mimecast has inspected more than 142 million emails that have passed through organisations’ incumbent email security vendors.

Latest results revealed 203,000 malicious links within 10,072,682 emails were deemed safe by other security systems – a ratio of one unstopped malicious link for every 50 emails inspected.

The report also found an 80% increase of impersonation attacks in comparison to last quarters’ report with 41,605 caught.

Additionally, 19,086,877 pieces of spam, 13,176 emails containing dangerous file types, and 15,656 malware attachments were all missed by these incumbent providers and delivered to users’ inboxes.

“Targeted malware, heavily socially-engineered impersonation attacks, and phishing threats are still reaching employee inboxes. This leaves organisations at risk of a data breach and financial loss,” says Mimecast cybersecurity strategist Matthew Gardiner.

“Our latest quarterly analysis saw a continued attacker focus on impersonation attacks quarter-on-quarter. These are difficult attacks to identify without specialised security capabilities, and this testing shows that commonly used systems aren’t doing a good job catching them.”

The report indicates the need for organisations to enhance their cyber resilience strategies for email with a multi-layered approach that includes a third-party service provider.

This new ESRA report follows an SE Labs Independent Email Security Services Protection group test, which gave Mimecast the top “AAA” rating.

Other email security services SE Labs evaluated were from Microsoft, Forcepoint, Symantec and Proofpoint.

“The SE Labs report highlights the need for multiple layers of protection to increase security efficacy and to address the rise of more advanced email attacks,” says Gardiner.

Mimecast is engineered to use multiple layers and types of detection engines, combined with analytics and a diverse set of threat intelligence sources, overseen by the Mimecast security operations centre.

This helps protect email data and employees from malware, spam, phishing, and targeted attacks.

Story image
75% of IT execs 'worried' about being targeted in cyber-attack
A new report from ConnectWise has shed light on the widespread concern about cyber-attacks, with 91% of SMB executives considering a move to an MSP if it provided the 'right' solution.More
Story image
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.More
Story image
Gartner predicts 75% of CEOs to be liable for cyber-physical security incidents by 2024
The nature of CPSs means incidents can quickly lead to physical harm to people, destruction of property or environmental disasters – and Gartner’s new research indicates that these incidents will increase drastically in the next few years if the lack of spending on these assets continues.More
Story image
Global DDoS attacks: What they are, how they work, and how to defend against them
Do not pay the ransom, and do make sure you've got strong DDoS protection, security firms warn.More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More