Email Security Threat Report 2020

Lincoln Wylie

Email and collaboration platforms are the connective tissue of most corporations and companies, in which facts is shared, programs are hatched, and alliances formed. Yet as a human-driven medium, electronic mail normally signifies the ‘weakest link’ in an organization’s protection approach. Indeed, ninety four% of cyber-threats originate in the electronic mail environment.

While traditional gateway resources seek out to filter out destructive emails on entry, their reliance on lists of ‘known-bad’ IPs, domains, and file hashes to establish an email’s menace stage is really limiting. A rule-primarily based tactic can normally recognize recognised spam and other lower-hanging fruit, but it fails to retain rate with attacker improvements.

Spear phishing, impersonation assaults, and account takeovers, in particular, continue being fruitful means that cyber-criminals can infiltrate an group. Increasingly specific electronic mail assaults of this type, which prevail over the constraints of traditional defenses, are a considerable challenge for protection groups nowadays.

Read More