The 6 Biggest Email Security Risks for Enterprise

The 6 Enterprise Email Security Risks

The 6 Biggest Email Security Risks for Enterprises

This blog continues our 12-part Cybersecurity User Awareness campaign, all of which can be viewed here:

  1. How to Fight Fraud with Security Intelligence
  2. The 6 Biggest Email Security Risks for Enterprises
  3. Security is Not Privacy: Ways to Keep Personal Data Secure
  4. Building a Mobile Threat Defense for Your Enterprise Devices
  5. How to Cut Security Risks for Remote Workers
  6. Do You Know All Types of Internet Security Threats?
  7. 10 Surprising Security Risks in Your Office
  8. 5 Steps of a Successful Cybersecurity User Awareness Program
  9. Five Alarming Approaches to Extortion
  10. How to Become a Harder Target From Malicious Threat Actors
  11. How to Reduce Security Risks in the Future
  12. You don’t need rocket science to build a Human Firewall

Protecting confidential information is absolutely essential to every organization – but it is especially essential to those that conduct a large amount of their business online. While securing information requires software - such as firewalls, antiviruses, and similar security software - a great security plan starts with employee involvement.

When employees are aware of security threats and their role in squashing them, they’ll create a human firewall that guards against the increasing number of threats in today’s business environment. If businesses don’t build this human firewall, they’re not just missing an opportunity to secure their workforce but they are also opening their organization up to a great number of threats.

To help your organization get started, here is a list of six email security threats to be aware of and additional guidance to help your employees confront them.

1. Chain Mail

Chain mail, also known as chain letters, can take on a lot of different forms. Most of us are familiar with strange emails that claim you’ll have seven years of bad luck if you don’t forward it to everyone you know, but some chain emails are more nefarious.

For instance, the original sender of the email could pose as someone in your IT team and claim that they’re clearing out unused software licenses. If you don’t reply to the email and send it to every active member of the organization, the email will claim that your email account or entire Office 365 license will be terminated. Users will assume it’s better to be safe than sorry and forward it to everyone on their team. Before you know it, the original sender of the email has collected every active email in your organization, as well as a list of potentially gullible targets for future attacks.

These attacks can get even more dangerous – for example, asking employees to donate money to a sick coworker when that coworker is unaware of any charity drive, creating a scheme for them to steal hundreds or even thousands of dollars from your employees. As well, they could ask employees to download a file that has malware inside which could compromise employees across the organization. To prevent these threats, let employees know what chain mail often looks like and make sure they know that your team will never do a “roll call” over email to decide which licenses to keep.

2. Phishing

Many employees don’t think they are vulnerable to phishing, but this false sense of security is exactly why phishing is so dangerous. In reality, a third of all breaches in 2019 involved phishing, and 78 percent of all cyber-espionage attacks are phishing related. Even government officials have fallen for phishing attacks! Consequently, it’s worth considering that your workforce is just as, if not more, vulnerable than your contemporaries.

An example of a phishing attack is an email from “Microsoft” asking employees to confirm their Office 365 login because of a recent breach. These emails can look extremely convincing at a glance, but if an employee checks the sender’s information, they will often see a strange email like 'support @ microsoftsupport.com' – clearly not an email that Microsoft would use for official correspondence. The IT team should ensure employees are always checking a sender’s email and never submitting their password in response to a “confirmation” email without express permission from IT.

3. Spear Phishing

Spear phishing is a more sophisticated form of phishing. A hacker will study an individual that they’ve identified as high value and/or a security risk, and prior to sending the phishing email they will call that person directly on a work-related topic and make them expect to receive an email or invitation. This will try to trick that individual into giving away confidential information, sending money, or downloading malware. These emails are even more dangerous than regular phishing attacks because the person feels as if the phisher actually knows them.

Preventing spear phishing is similar to preventing phishing. Make sure that employees are checking the sender’s information, and never download files or follow links coming from an unfamiliar “personal” account. If they are unsure, they should either reach out to the purported sender using their official company email or contact IT directly for further guidance.

4. Spoofing

Spoofing is used to deceive a phone, email, or internet user into thinking they are communicating with a known or trusted source. For example, many scam calls will spoof a phone number of someone in your organization (such as a supervisor or IT team member) instead of having the scammer use their actual number. This can be used to obtain important company information or even money from employees and is often utilized as a middle-point leading to a bigger attack, such as vishing (see below).

The first step to thwarting a spoofing attempt is by informing your employees that this practice is very common. If they get a suspicious call from someone using a familiar number, they should try to end the call as soon as possible and forward information about the call to IT so they can alert other members of the organization. If they’re not sure if the caller is legitimate or not, employees should offer to call them back since spoofing is one-way. So long as the employee is making the phone call to a familiar phone number, they won’t end up with a scammer on the other line. From there, they can confirm the identity of the caller.

5. Vishing

Vishing is similar to phishing, but it takes place over voice channels like telephone, voicemail, or even video conferencing platforms. The goal of these calls is typically to convince users to surrender money or private information by spoofing phone numbers and pretending to be a supervisor or client.

For example, you may receive a spoofed phone call from a service provider claiming your account has been compromised and you need to speak with a representative. When you speak with the representative regarding your account, they’ll ask for logins, money, bank info, and more – they’ll often try to get as much information or resources from you as possible.

To prepare for a vishing attempt, IT teams should reassure employees that these calls are often designed to make you panic, and that a real representative that needed this information would likely be patient and willing to work through this with a member of the IT team. Employees should always ask for a moment to stop and think if a call seems fishy or threatening. If an employee gets a suspicious call such as this, they should inform the caller that IT usually handles these calls and forward the call to IT for further evaluation.

6. Malicious Attachments

Although many email services offer inherent virus scanning capabilities, malicious attachments are still a danger for many businesses. Scammers often will send an innocuous email with an attachment to your employees, perhaps as part of a phishing attempt, and encourage employees to download the file. By playing off of fear and/or curiosity, these scammers are able to convince workers to download compromised files that will release malware if the document is downloaded or opened.

There are two primary ways to protect your employees from malicious attachments: prevention and protection. Ask users not to download strange documents, even if they are curious or threatened. However, prepare for employees to slip up on occasion by ensuring that all devices and servers are equipped with a quality antivirus that can flag and destroy malware from malicious attachments.

Final Thoughts

Enterprises face a variety of threats through email and similar channels – and your employees are the first line of defense against these attacks. Unfortunately, not every employee is well-versed and aware of common security threats. Even if they are, their hubris can make them as vulnerable as someone who is entirely unaware of the cyberthreats.

IT teams and the organizations that support them should not only talk to employees about the dangers of phishing and similar attacks, but also ensure they have a security solution that can protect you’re their organization if an attacker manages to successfully trick an employee. It’s clear that cyberattacks aren’t going to stop any time soon and may even increase exponentially due to the popularity of remote work. The sooner that your team educates employees regarding the inherent threats of working online, the more protected you’ll be in case of an attack.

Don’t Let Your Employees Get Phished!

Our most recent infographic will help your team know what kinds of phishing attacks to expect.

View Now

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO

Cybersecurity

Related Articles

Cybersecurity Update October-November 2020
  • 03 dicembre 2020
  • Bala Sethunathan
  • Managed Security, Cybersecurity

Cybers Security Update October-November 2020

Be prepared! A data breach doesn’t strike only large enterprises. Read more about the latest attacks where hackers tried to steal personal data.

multilayer-edr-xdr-is-next

Multilayer EDR (XDR) is Next

Most organizations don’t want to work with EDR due to the huge number of alerts to manage. Cross-layer EDR (XDR) can be the solution. Find out how.

Endpoint Security: What you need to know about "Next-Gen" EDR

"Next-Gen" EDR

Combining EDR and SIEM might be the ideal way of fighting cyber security risks. But why isn’t EDR enough? Learn more about the challenges of standalone EDR and how it differs from SIEM.