Yaffa Finkelstein, Product Marketing Manager, CloudGuard SaaS, published January 13, 2020

Do you know when the first email was sent?

It was 1971 when Roy Tomlinson sent the first email across a network. Almost 40 years ago, he used the @ sign for the first time to denote a separation between the recipient’s name and their machine name when he sent his message.

Since then, with the rapid adoption of the internet and then the mobile internet, the email security market matured as enterprises understood that accessing proprietary information via the network exposed them to cyber security risks.

It might therefore seem surprising that almost 40 years since the world’s first networked electronic mail was sent, Verizon’s 2019 Data Breach Investigations Report called out phishing as the main cyber security threat facing enterprises in the digital world. Gartner’s findings support this – in their Fighting Phishing Report, they found that 90% of cyber threats against enterprises start with email, making email the #1 attack threat vector against enterprises. That’s right, phishing has been identified as one of the main mechanisms used to execute the delivery phase of the attack kill chain.

Enterprise email security is a mature market, which poses the obvious question of why cyber criminals are still using emails as an attack vector, and how it’s possible in a mature market for these schemes to reach such a high success rate. Are email security solutions ineffective, or are the adversaries just very smart at circumventing email security controls?

Recent years have seen a rapid shift to cloud based email providers – whether that’s moving existing office suite capabilities to the equivalent cloud based office suites (think an on-prem Microsoft Office and Exchange moving to Office 365), or new organizations starting with a cloud installation.

Private end users don’t spend any time worrying about the risks involved in relying on the default security built into cloud email providers but there are inherent vulnerabilities in cloud office suite solutions which could keep any CISO up at night.

And what of the small to medium sized organizations who don’t have a CISO or security team, but leave email security to the IT administrator? Are the IT managers giving a thought to the risks posed to the organization once their email and file storage are both moved to the cloud? Multi factor log-ins won’t defend their end users from the phishing schemes which are seeing so much success that cyber criminals are continually increasing their phishing efforts.

The risks to organizations who move their office suites to the cloud are partially addressed by CASB solutions, but these don’t address the dangers associated with mailboxes in the cloud.

So what’s a cloud native organization to do? How can you make sure that you don’t fall victim to the ‘clickbait’ which is responsible for 90% of enterprise breaches?

As the new decade dawns, IT managers and CISOs have an array of email security options to choose from, but picking the right one can be a daunting prospect.

In this series of three blog posts we will look at the different types of security available for cloud email accounts and office suites and examine the advantages of each:

  • Next up – what tools are available for IT managers / CISOs, to secure their organizations’ cloud mailboxes? We’ll walk through the different prevention methodologies powering the solutions on the market.
  • Followed by – how to pick the best email threat prevention for your business; an analysis of which solutions best fit organizations undergoing digital transformation, and which would be better for a cloud native business.

In the meantime, if you haven’t already checked it out, keep up with the latest in phishing schemes and other cyber attacks by subscribing to the Check Point Research Blog.

You may also like