Email Security

    Protect Against Targeted Attacks Webinar - The Highlights

    10.jpg

    First of all, I’d like to say a big ‘thank you’ to everyone who attended Tuesday’s Mimecast webinar featuring Forrester on ‘Protecting Against Targeted Attacks’.

    The interest has been huge, and we’ve made the recording of the session available here. We’ll also be focusing on key themes raised during the session over the coming weeks on this blog.

    To start, we thought it would be useful to pull out and reflect on some key quotes from the session.

    140924_forrester_webinar_image-300x168.png

    Rick Holland, Principal Analyst, Forrester Research:

    - '67% of the espionage cases in organizations involved phishing’ discussing the Verizon ‘2014 Data Breach Investigations Report'.

    - 'There are two types of phishing vectors – one the malicious attachment…and two, URLs to malicious sites'.

    - 'The average cost of a data breach is $3.5m up 15% from 2013’ discussing the Ponemon Institute ‘2014 Cost of a Data Breach Study: Global Analysis’ sponsored by IBM. Interestingly, class action law suits of effected customers are part of the calculation and might be a rising trend for organizations to address.

    - 'As it becomes more common for remote workers to operate outside of VPNs (BYOD and BYOC), enterprises must protect the user when they actually click'. 'Even if users could put something on their mobile device to protect them, they are hesitant from a user experience perspective.' - this was one of the key points in the session, as traditional approaches to security only protect users on the network and corporate managed devices. It’s important to think beyond this given BYOD and remote working. Protection must be available no matter the device used to access corporate email systems, without increasing the IT overhead or adversely affecting the users’ experience. As Rick suggested, organizations must ‘protect the click’.

    - 'Sometimes the URL isn’t bad at the time of delivery’ the attacker may turn the server over from benign to malicious after the email is sent.'

    - 'URL rewriting is emerging to protect the user…I recommended it as an RFP requirement.'

    - 'Whatever the culture of the organization, use that to (tailor) security training…increasing awareness and propensity to report incidents.'

    - '(Phishing) is only going to get more and more sophisticated.'- which is why the protection organizations put in place now must be able to stay ahead of the attackers.

    Steve Malone, Security Product Manager, Mimecast:

    - 'Phishing is viewed as a technology problem…the usual approach is to add more technology. But the issue is that adding more technology is actually increasing complexity.' Steve further explained that the most successful approach is two-fold: choosing the right technology coupled with user education.

    - 'As we’ve got better at protecting against these attacks, the attackers have moved the goal posts. We now have to assume all the links in emails are bad.'

    - 'Clean up (post-attack) is generally very difficult and time consuming and the root cause is not addressed.'

    - 'Mimecast’s Targeted Threat Protection addresses advanced attacks in email by rewriting the URLs. It means protection regardless of the device used.'

    - 'We’re building into the service a real-time education component for users.'

    It’s clear from the interest and the great questions we received at the end of the presentations that this is a hot topic. The evolution of threats is forcing IT teams to rethink the planning, purchasing and management of their business security systems. In addition, it’s being recognized that in order to stay ahead of the attackers, technology alone is not the answer – the complete solution needs to account for this and train users in a new way.

    Please leave a comment or @reply me at @orlando_sc if you’ve any particular areas you want us to cover in our follow up posts.

    Subscribe to Cyber Resilience Insights for more articles like these

    Get all the latest news and cybersecurity industry analysis delivered right to your inbox

    Sign up successful

    Thank you for signing up to receive updates from our blog

    We will be in touch!

    Back to Top