Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 23, 2018

How many times have you come to accept a certain “truth” that eventually turned out to be complete fiction? 

email-security-dos-and-donts.jpg

From “the world is flat” to “the Earth is the center of the universe” to “the government would never monitor my emails: these mass beliefs in something that were ultimately proven to be a myth was usually to the detriment of those who refused to accept reality over their closely held beliefs.

New Cybersecurity Myths To Consider

And closer to home, for the average security professional, there are a set of beliefs that have been held sacrosanct by far more people than you could imagine. Unfortunately, the average hacker knows all too well that these beliefs are in reality myths which with they can exploit to financial gain. We have covered “Cybersecurity Myths Versus Reality” but felt it was time to revisit new myths to consider.

According to William H. Sato in his Forbes article titled “These Are 10 Cybersecurity Myths That Must Be Busted,” you should re-evaluate your stance on these myths:

1.       "Cyber risk is a separate category of risk

2.       Cybersecurity is just an IT issue

3.       Protecting yourself is good enough

4.       Digital and physical security are separate systems

5.       Going back to paper (or disconnecting from the internet) minimizes risk

6.       Getting hacked is an embarrassment

7.       Using anti-virus software is enough

8.       Cybersecurity is just a form of defense

9.       New features of IoT devices trump security

10.   You’ll never get attacked or breached”

While some of these seem obvious, too many companies are still fighting the application innovative security technologies that take into account progressive cyberthreat prevention techniques which would address the new realities of cybersecurity.

Cybersecurity’s New Reality

In order to address cybersecurity’s new realities your solution should:

  • Inspect a broad range of documents and common file types
  • Detect malicious active content, exploits and phishing in real time
  • Block malicious URLs embedded in emails and attachments
  • Bring signature-less value to low upgrade requirements

Innovative Myth Buster

Breaking cybersecurity myths requires unmatched detection of advanced malware and should be developed by hackers who best understand how to defeat security tools that can compromise your network.

In order to ensure safe content, you will need a cybersecurity strategy based on tools that won’t miss zero-day attacks and can’t be evaded by smart cybercriminals. An effective solution will evaluate every line of code, making evasion techniques ineffective.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 23, 2018

You may also like:

Building a Better Email Security Sandbox

You need the best security technology in…

You need the best security technology in today’s marke… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 13, 2018

7 Tips to Safeguard Public WiFi Use

With Cybersecurity Awareness Month here,…

With Cybersecurity Awareness Month here, we’re ready t… Read More >

Michael Madon

by Michael Madon

SVP & GM of Mimecast Security Awareness

Posted Oct 30, 2018

Cyber Risk, Cyber Insurance and Reducing Human Error

Here's the deal with cyber insurance. Co…

Here's the deal with cyber insurance. Companies evaluating c… Read More >

Michael Madon

by Michael Madon

SVP & GM of Mimecast Security Awareness

Posted Oct 16, 2018