Why are we still talking about email security?

By : Krishna Anindyo | Thursday, February 27 2020 - 14:08 IWST

CloudGuard SaaS (Images by Check Point Software)
CloudGuard SaaS (Images by Check Point Software)

INDUSTRY.co.id - It was 1971 when Roy Tomlinson sent the first email across a network. Almost 40 years ago, he used the sign for the first time to denote a separation between the recipient’s name and their machine name when he sent his message.

Since then, with the rapid adoption of the internet and then the mobile internet, the email security market matured as enterprises understood that accessing proprietary information via the network exposed them to cyber security risks.

It might therefore seem surprising that almost 40 years since the world’s first networked electronic mail was sent, Verizon’s 2019 Data Breach Investigations Report called out phishing as the main cyber security threat facing enterprises in the digital world.

Gartner’s findings support this - in their Fighting Phishing Report, they found that 90% of cyber threats against enterprises start with email, making email the attack threat vector against enterprises. That’s right, phishing has been identified as one of the main mechanisms used to execute the delivery phase of the attack kill chain.

Enterprise email security is a mature market, which poses the obvious question of why cyber criminals are still using emails as an attack vector, and how it’s possible in a mature market for these schemes to reach such a high success rate. Are email security solutions ineffective, or are the adversaries just very smart at circumventing email security controls?

Recent years have seen a rapid shift to cloud based email providers – whether that’s moving existing office suite capabilities to the equivalent cloud based office suites (think an on-prem Microsoft Office and Exchange moving to Office 365), or new organizations starting with a cloud installation.

Private end users don’t spend any time worrying about the risks involved in relying on the default security built into cloud email providers but there are inherent vulnerabilities in cloud office suite solutions which could keep any CISO up at night.

And what of the small to medium sized organisations who don’t have a CISO or security team, but leave email security to the IT administrator?

Are the IT managers giving a thought to the risks posed to the organisation once their email and file storage are both moved to the cloud? Multi factor log-ins won’t defend their end users from the phishing schemes which are seeing so much success that cyber criminals are continually increasing their phishing efforts.

The risks to organisations who move their office suites to the cloud are partially addressed by CASB solutions, but these don’t address the dangers associated with mailboxes in the cloud.

So what’s a cloud native organisation to do? How can you make sure that you don’t fall victim to the ‘clickbait’ which is responsible for 90% of enterprise breaches? As the new decade dawns, IT managers and CISOs have an array of email security options to choose from, but picking the right one can be a daunting prospect.



News Comment

Today's Industry

Paul Martinkovic, JERDE Chief Executive Officer, Named One of Los Angeles’ Most Influential People by the LA Business Journal

Rabu, 03 Juni 2020 - 15:30 WIB

JERDE CEO Paul Martinkovic Named One of Los Angeles’ Most Influential People by the LA Business Journal

Paul Martinkovic, Chief Executive Officer of JERDE (The Jerde Partnership), an iconic and internationally renowned architecture and urban planning studio headquartered in Downtown Los Angeles,…


Kamis, 28 Mei 2020 - 16:15 WIB

PATA and FeedsFloor Sign Organisational Partnership

The Pacific Asia Travel Association (PATA) is pleased to announce a new organisational partnership with FeedsFloor, a digital platform that enables clients to create and manage various event-related…

Veolia Water Technologies

Kamis, 28 Mei 2020 - 15:45 WIB

Veolia Water Technologies & Urban Utilities to Install Asia Pacific’s First Full-Scale Sidestream Mox Treatment Plant

Veolia Water Technologies and Urban Utilities are working to install Asia Pacific’s first full-scale sidestream ANITA Mox treatment plant this year. A first-of-its-kind in Australia, this…

HackerOne (Images by Tekno Tempo.co)

Kamis, 28 Mei 2020 - 15:15 WIB

The Global Community of Hackers Uncovered 170,000 Vulnerabilities

A bounty — or bug bounty — is a monetary award given to a hacker who finds and reports a valid security weakness to an organisation so it can be safely resolved. With nearly half of bounty…

HIMA (Photo by Rail Solutions Asia 2019 - German Pavilion)

Kamis, 28 Mei 2020 - 14:29 WIB

How to Keep Your Plant Running

Even with minimum internal staffing levels, plants can operate safely. The number of employees required onsite at any one time depends, of course, on the size and complexity of the plant. Even…