Safeguard Email From Internal and External Threats

 
 
By Karen A. Frenkel  |  Posted 04-17-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Safeguard Email From Internal and External Threats
    Next

    Safeguard Email From Internal and External Threats

    Email continues to be a major source of cyber-attacks, and security and risk officers need to be more aware of both outside attackers and internal threats.
  • Previous
    Information Theft Via Email
    Next

    Information Theft Via Email

    33% of the security and risk professionals surveyed have experienced information loss, theft or attack via email within the last two years.
  • Previous
    The Breakout of Attacks
    Next

    The Breakout of Attacks

    Phishing attacks leading to malware infection or data loss: 44%, Business email compromise or impersonation: 40%, Insiders emailing sensitive data outside the company: 36%
  • Previous
    Internal Threats in the Past Two Years
    Next

    Internal Threats in the Past Two Years

    Compromised accounts by insiders: 63%, Careless misuse: 57%, Malicious insider incidents: 41%, No insider incidents: 1%
  • Previous
    The Phishing Threat
    Next

    The Phishing Threat

    Four out of 10 companies surveyed reported a phishing attack in the past two years.
  • Previous
    Financial and Productivity Losses
    Next

    Financial and Productivity Losses

    75% of respondents said compromised accounts had a significant or moderate financial impact. 68% said they had a significant or moderate impact on productivity.
  • Previous
    Levels of Concern
    Next

    Levels of Concern

    77% of respondents are concerned or very concerned about compromised accounts, 61% share the same level of concern for careless misuse, and 55% share the same level of concern about malicious insiders.
  • Previous
    Monitoring the Problem
    Next

    Monitoring the Problem

    70% of respondents use network monitoring to monitor, block or respond to internal email threats; 66% use a secure email gateway; and 62% use data loss prevention tools.
  • Previous
    Old Technologies Used for New Threats, Part 1
    Next

    Old Technologies Used for New Threats, Part 1

    Anti-spam: 62%, Anti-virus: 57%, Anti-phishing: 52%, Privacy controls: 48%, Data loss prevention inspection: 45%
  • Previous
    Old Technologies Used for New Threats, Part 11
    Next

    Old Technologies Used for New Threats, Part 11

    Threat visibility and response: 44%, Multi-factor authentication: 42%, Automatic blocking malicious emails: 42%, Sandboxing: 32%
  • Previous
    New Tactics Overlooked
    Next

    New Tactics Overlooked

    Sandboxing, multifactor authentication and automatic blocking of malicious emails are critical to defend against sophisticated attacks, yet fewer respondents are using these security tools.
 

Email continues to be a major source of cyber-attacks, and security and risk officers need to be more aware of both outside attackers and internal threats, says a recent study. The report, "Don't Just Look Externally for Security Threats," points to three groups responsible for these threats: external attacks that have compromised internal accounts; careless misuse by internal policy violators and others who accidentally leak or expose data or systems; and malicious insiders who take or misuse data or exploit systems. The study was commissioned by Mimecast and performed by Forester Consulting. "Not all threats are created equal," said Neil Murray, chief technology officer at Mimecast. "Therefore, organizations need a cyber-resilience strategy to help [them] prepare for any type of attack, whether from outside or inside of the organization, malicious or accidental."  Just over 250 security and risk professionals in the U.S., the U.K., South Africa and Australia participated in the survey. Of these, 37 percent are directors, 36 percent are vice presidents, 19 percent are managers and 8 percent are at the c-suite level. Regarding security responsibilities, 44 percent are shared decision-makers, 29 percent are primary decision-makers and 27 percent are strategy executors.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register