Story image

A guide to staying one step ahead of modern email attackers

05 Mar 2018

With the attack surface increasingly becoming larger and more varied, there’s nothing cybercriminals love more than a simple email attack.

Email serves as an organisations’ communicative lifeblood, thus making it the most critical vector for an assortment of threats, both inbound and outbound.

According to the SonicWall Annual Threat Report, ransomware use grew by 167 times year-over-year in 2017 and is the payload of choice for malicious email campaigns.

Businesses need to be actively thinking about their approach to email security, as the fact is that traditional approaches are just not designed to handle advanced threats such as ransomware and zero-day attacks.

SonicWall have commissioned a paper that explores the critical components of an effective email security solution, in order to help organisations stop advanced threats at the gate.

Organisations need to deploy advanced security solutions with features like multi-layer protection and sandboxing if they’re going to stay on top of modern-day threats such as spear phishing, spoofing, zombies, directory harvest (DHA) and Denial of Service (DoS) attacks.

SonicWall assert that traditional email security methods fall short on simple prevention and detection strategies, while more advanced solutions provide groundbreaking protection against things like data-loss, phishing, fraud and spam.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.