Cybersecurity: Are Your Documents And Emails Safe?
Far less than you may think ...
Posted by Pritesh Ganatra on 11/10/2022 @ 8:00AM
Are you aware that when you receive an email from someone you recognise, it might not be from who you think it is? There are, on average, over three billion fake emails sent around the world, every single day ...
It's very easy to think your cybersecurity is good ... when actually it's nowhere near!
There are many forms of cyberattack targeted at most industry types, but phishing and spoofing emails remain one of the highest forms of successful cybercrime. Why is this, you may ask? Put simply, because companies and organisations do not implement industry-standard authentication protocols to their email systems.
"Some shocking statistics from the GOV.UK website shows the extent of the problem!"
Phishing is the first delivery method for other types of malicious software. A phishing attack isn't just targeted at gaining information. Phishing attacks can also be used to distribute malicious programs, such as ransomware. Email attachments are still the main method of delivery for malicious programs.
Just in the current pandemic, over £2 million has been lost to coronavirus-themed scams, phishing emails and other fraud in the UK alone as cybercriminals look to exploit the COVID-19 pandemic for their own gain.
Figures from the US for 2020 are staggering:
Up to 97% of emails cannot be identified by the receiver as fake and not sent by a genuine person
Up to 30% of emails are targeted to a specific individual, and despite the training and publicity surrounding fake emails containing links to malicious websites that download viruses into a company's network, as many as 12% of users actually open and click on the link!
85% of US organisations have suffered from phishing attacks. These attacks are everywhere, and most organisations will encounter them at one point or another.
Office 365 does attempt to filter out incoming mail through the Microsoft data centres, but even they do not have dedicated and sophisticated software to sniff the email for viruses contained within links and attachments. Traditional antispam software is not the same as email security as it only filters out some emails and cannot detect malicious content.
Fully-managed services from the likes of Trend Micro are specialists in threat detection, email security, antivirus and antimalware for cross-platform protections.
These companies collect all emails and pass them (always unopened and cannot read the content) through their dedicated emails servers with highly developed software to probe and penetrate emails and attachments, 'sniffing' out any potential threats and putting suspect emails in quarantine within their systems.
"This way, dodgy emails don't get delivered to the user at all!"
Off-site email security systems are becoming increasingly powerful and can scan direct emails from Microsoft as the next layer of protection from phishing scams. Microsoft Office 365 documents are also vulnerable to being hacked. Your files are potentially able to be injected with viruses, so when you download a saved document, the virus comes with it.
In the present 'working from home' environment, company documents may be downloaded and uploaded multiple times by multiple users, increasing the risk of a hacker gaining access to company servers and information via a laptop at home connected to the company systems.
Anything that comes in and goes out of your organisation is not always as secure as you think.
Until next time ...
Would you like to know more?
If anything I've written in this blog post resonates with you and you'd like to discover more, it may be a great idea to give me a call on 01604 926100 or take a look at my website which you can find by clicking here.
The word 'Technology' has too many connotations in today's world!
Where do we start? Simple terms like 'IT' and 'Telecoms'? or terms that appear NOT to have an actual meaning at all!, e.g. 'Internet of Things (IoT).
Technology also encompasses specialist products and services like 'Rugged' and 'Tough' android devices, Lone Worker Software, panic alarm devices, smart energy devices, low energy lighting, credit card terminal (PCI DSS) security, indoor/ outdoor Wi-Fi systems, Ultrafast Gigabit internet connectivity, access control systems, industrial IoT circuit controllers.
BTS UK can consult from simple solutions to the most complex, provide some of the products through a wholesale channel, bring together a multi-disciplined 'Task Force' to deliver and implement complete Technology 'projects'.
I am your technology problem solver and I look forward to helping you.
No unauthorised use, duplication, distribution or modification to any original content contained within this blog is permitted without prior written permission of the author. All other trademarks and registered names are acknowledged.