Email is the Largest Source of Security Breaches

Are you putting systems in place to protect your systems?

Are you patching your people?

 
 

  • Malicious message volume in Q2 increased 36% vs. Q1 2018. While still lower than peak volumes experienced in 2016 and 2017, payload variety from a large group of threat actors rather than massive campaigns from a small group of high-volume attackers characterized Q2.

 

  • Ransomware returned with commensurate drops in credential stealers and banking Trojans. However, at just over 11% of total malicious message volume, ransomware appears to be a normal part of threat actors’ rotating toolkits rather than the dominant payloads of the quarter.  We also continued to observe consolidation around major strains like GandCrab–introduced in Q1 2018–and Sigma, another relative newcomer to the ransomware landscape.

 

  • On average, customers targeted in email fraud attacks received 35 business email compromise (BEC) messages in Q2, a 26% increase over Q1 and an 87% increase over Q2 2017. As in previous quarters, these increases were not correlated with the size of the organization being attacked; companies of all sizes were targeted equally, although some industries such as retail, healthcare and government all experienced larger increases in BEC activity than their counterparts.

 

Proofpoint Quarterly Threat Report Q2 2018

There are a ton of options for Email protection ranging from free/included to rather costly.  But consider this, how much time are your employees spending deleting unwanted emails?  It’s more than just spam.  Are you filtering low priority, imposter, bulk and phishing not to mention malware and adult emails?  Are you protecting against email fraud – (Sender-recipient relationship, Domain Reputation, email content, email headers and envelop attributes).  Are you training your employees to recognize phishing?

Let CIT show you how we secure and train your largest attack vector

 

Corporate Information Technologies provides small to mid-market organizations with expert I.T. services including compliance assessment, cybersecurity penetration tests, and comprehensive business continuity planning services. Corporate Information Technologies can help organizations, quantify, create, refine, and mitigate the risks presented by business threatening disasters in whatever form they may be disguised. 

Contact us to learn more and let us show you how good I.T. can be!