Page 9 - Cyber Defense eMagazine - March 2018
P. 9

ARE YOUR EMAILS SAFE?


               UNDERSTANDING THE DIFFERENT TYPES OF EMAIL SECURITY SOLUTIONS

               by Scott Raspa, VP, Sales & Marketing, Graphus

               When we’re talking about cybersecurity, the first thing that comes to mind isn’t always
               emails. However, up to 91 percent of cyber attacks actually arrive in your inbox. These
               email-based attacks come in multiple forms:


                   ●  Phishing: this is an attempt to steal login credentials pretending to be a trusted
                       site - like your bank or G Suite login.

                   ●  Spear  Phishing:  this  is  similar  to  a  phishing  attack  however  these  are  much
                       more  targeted  and  personalized.  The  attackers  have  done  their  research  and
                       send personalized messages to the target.

                   ●  Malware (attachments, links, drive-by downloads): these are attacks that contain
                       malware. It could be a malicious attachment, link, or even a drive-by download.

                   ●  Email  Scams:  this  can  be  similar  to  a  phishing  attack  however  it  doesn’t

                       necessarily spoof a trusted identity. For example, cyber criminals could pretend
                       to be your vendor and send you an invoice for payment. This is also known as
                       business email compromise (BEC).


               So, when you’re focused on making your company safe from threats, you should begin
               by carefully considering how to protect your email communications from these types of
               attacks.

               Below we’ll break down the different types of solutions and if they protect against these
               types  of  attacks.  Now  keep  in  mind  that  not  all  solutions  are  created  equal  so  a
               company  in  one  category  (ie  Endpoint  systems)  may  have  more  functionality  than
               another company in that same category. The information below is meant to be more of
               a guide in helping you better understand how these solutions protect your organization
               from  the  above  attack  types.  Also  note,  where  it  says  “partial”  it  means  that  these
               solutions don’t necessarily offer full/complete protection for that particular attack type.








                     9   Cyber Defense eMagazine – March 2018 Edition
                         Copyright © 2018, Cyber Defense Magazine,  All rights reserved worldwide.
   4   5   6   7   8   9   10   11   12   13   14