Email Security 101: The Most Common Risks Explained
£11,000.
That is the average amount that small business across the UK lose to cyber-attacks every single year.
The widespread problem of cyber-attacks is growing yearly. However, the pandemic has led to an explosion in attacks. According to cyber-security firm Mimecast, email-based security threats have soared by 64 percent.
That means that your business is more at risk of cybercrime than ever before. It is therefore critical to ensure that you and your staff are educated about the current threat landscape, and what you need to do to avoid falling victim to malicious phishing emails.
Fortunately, the team at entrust IT Group have years’ of experience guiding our clients through the minefield that is cybersecurity, and we have pooled our knowledge to provide you with a clear picture of what to look out for, and how to keep your data safe.
Social Engineering & Spoofing
Social Engineering attacks work by tricking unsuspecting individuals into divulging confidential or personal information that will be used for fraudulent purposes. This is typically done by a process called spoofing, whereby an attacker masquerades as a legitimate person or business using a carefully constructed email or email address.
The emails encourage the recipient to send bank information, money, or login details to the imposter, which can later be used to steal money or begin a devastating attack such as ransomware. They will typically contain a link or downloadable attachment which is designed to pique curiosity. The attacker will also disguise themselves as a friend, a colleague, or a boss.
Phishing or Spear Phishing
Phishing is a type of social engineering attack. The attacker uses a carefully constructed email, designed to look like it is from a reputable source, to try to encourage the recipient to click a malicious link, or input sensitive information such as login details.
Typically, a phishing email will look like a commonly used service, such as Amazon or Apple. This is because they will garner the broadest reach. Phishing emails are getting better, but they usually have some tell-tale signs that will expose them. Look for the following in an email you receive:
- Spelling mistakes or punctuation errors
- Check the email address to make sure it looks correct
- Check links by hovering your mouse over them. DO NOT CLICK.
- Starting an email with ‘Dear Member’ or ‘Dear User’, rather than your name
- Emails requiring urgent action
Spear phishing differs slightly from normal phishing in that it is designed to specifically target one organisation, or even one individual. This attack take planning and research to target the right individual and is therefore somewhat more malicious. An example of this would be a spoofed email from a particular person’s boss, asking for money to be transferred urgently or bank details to be inputted. The attacker is relying on the fact an employee is less likely to question their boss if they ask for something urgently and will give over what is requested without delay.
Business Email Compromise (BEC)
BEC is a type of spear phishing designed to target companies who conduct wire transfers or have suppliers abroad. Publicly available email addresses of high-level executives are spoofed or compromised through keyloggers or phishing attacks to be used for fraudulent transfers.
These attacks differ from traditional phishing in that they use legitimate, but compromised, email accounts to work – making them extremely difficult to spot. They typically use 5 types of scam, according to cybersecurity firm Trend Micro:
- The Fake Invoice Scheme - Companies with foreign suppliers are often targeted with this tactic, wherein attackers pretend to be the suppliers requesting fund transfers for payments to an account owned by fraudsters.
- CEO Fraud - Attackers pose as the company CEO or any executive and send an email to employees in finance, requesting them to transfer money to the account they control.
- Account Compromise - An executive or employee’s email account is hacked and used to request invoice payments to vendors listed in their email contacts. Payments are then sent to fraudulent bank accounts.
- Solicitor Impersonation - Attackers pretend to be a lawyer or someone from the law firm supposedly in charge of crucial and confidential matters. Normally, such fake requests are done through email or phone, and during the end of the business day.
- Data Theft – Employees under HR and bookkeeping are targeted to obtain personally identifiable information (PII) or tax statements of employees and executives. Such data can be used for future attacks.
Ransomware, Trojan and other Malware
To catch you out with malware or ransomware, an attacker must trigger a person to download an attachment. By clicking on a malicious attachment and triggering a download, an employee can unknowingly run a malicious programme which, once it is inside your network, is difficult to stop.
If you do happen to click on a malicious attachment by accident, speed is critical. The best thing to do is to disconnect your device from the internet as quickly as possible, as the trojan may need to download malicious code from the internet to harm your device fully. It will also try to spread across your network to infect other devices, so the faster you can get it offline the better. If you can turn your device off completely, that will help too. Make sure that you mark it is being infected and notify your IT team immediately so that they can conduct relevant steps to keep you and your corporate network safe.
What you should do to stay safe
There are three main ways you can keep your company safe amid this new, more advanced threat landscape. Those are:
- Education and Training
- Advanced Anti-Virus (AV) software
- Email Filtering
First and foremost, training your staff to spot malicious emails is critical. Since people are often the weak spot in a company’s defences, training your staff is absolutely essential to protect your data. A great way to start is using entrust IT Group’s security awareness courses. These short courses are emailed to all of your staff and their results are collated in a clear portal, allowing management to see which team members need more assistance. The service even sends example phishing emails to your staff to see which of them will be fooled.
Strong AV solutions are critical to eliminate a malicious programme before it can cause damage to your network. The entrust IT Group recommends Sophos Endpoint X, as it has some of the strongest protection, including Ransomware protection, on the market.
Finally, Email filtering will dramatically minimise the numbers of phishing emails working their way through to people’s inboxes, thus reducing the opportunities for compromise.
As more and more of us are working remotely, with weaker security systems in place, we can expect that cyber attacks will become more prevalent. With that in mind, it is so important to be prepared. No business is immune, regardless of their size, so you should ensure that you are protected.
To learn more about cyber security, download our FREE White Paper for some handy tips and tricks!
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)