Email Security Threat Report 2020

Email and collaboration platforms are the connective tissue of most corporations and companies, in which facts is shared, programs are hatched, and alliances formed. Yet as a human-driven medium, electronic mail normally signifies the ‘weakest link’ in an organization’s protection approach. Indeed, ninety four{d5f2c26e8a2617525656064194f8a7abd2a56a02c0e102ae4b29477986671105} of cyber-threats originate in the electronic mail environment.

While traditional gateway resources seek out to filter out destructive emails on entry, their reliance on lists of ‘known-bad’ IPs, domains, and file hashes to establish an email’s menace stage is really limiting. A rule-primarily based tactic can normally recognize recognised spam and other lower-hanging fruit, but it fails to retain rate with attacker improvements.

Spear phishing, impersonation assaults, and account takeovers, in particular, continue being fruitful means that cyber-criminals can infiltrate an group. Increasingly specific electronic mail assaults of this type, which prevail over the constraints of traditional defenses, are a considerable challenge for protection groups nowadays.

As Peter Firstbrook, VP Analyst at Gartner, places it: “Common controls, these as conventional, popularity-primarily based, anti-spam, and signature-primarily based antivirus, are wonderful for common assaults and rip-off strategies, but they are not great more than enough for safety versus more specific, innovative, and superior assaults. Much more than at any time, modern-day electronic mail protection requires innovation and a shift in state of mind to fight the evolving menace landscape.”