Page 9 - Cyber Defense eMagazine - March 2018
P. 9
ARE YOUR EMAILS SAFE?
UNDERSTANDING THE DIFFERENT TYPES OF EMAIL SECURITY SOLUTIONS
by Scott Raspa, VP, Sales & Marketing, Graphus
When we’re talking about cybersecurity, the first thing that comes to mind isn’t always
emails. However, up to 91 percent of cyber attacks actually arrive in your inbox. These
email-based attacks come in multiple forms:
● Phishing: this is an attempt to steal login credentials pretending to be a trusted
site - like your bank or G Suite login.
● Spear Phishing: this is similar to a phishing attack however these are much
more targeted and personalized. The attackers have done their research and
send personalized messages to the target.
● Malware (attachments, links, drive-by downloads): these are attacks that contain
malware. It could be a malicious attachment, link, or even a drive-by download.
● Email Scams: this can be similar to a phishing attack however it doesn’t
necessarily spoof a trusted identity. For example, cyber criminals could pretend
to be your vendor and send you an invoice for payment. This is also known as
business email compromise (BEC).
So, when you’re focused on making your company safe from threats, you should begin
by carefully considering how to protect your email communications from these types of
attacks.
Below we’ll break down the different types of solutions and if they protect against these
types of attacks. Now keep in mind that not all solutions are created equal so a
company in one category (ie Endpoint systems) may have more functionality than
another company in that same category. The information below is meant to be more of
a guide in helping you better understand how these solutions protect your organization
from the above attack types. Also note, where it says “partial” it means that these
solutions don’t necessarily offer full/complete protection for that particular attack type.
9 Cyber Defense eMagazine – March 2018 Edition
Copyright © 2018, Cyber Defense Magazine, All rights reserved worldwide.