Why is Protecting my email important?
Reason1: Email is the most common IT security threat for organizations
An estimated 75 percent of identified, impactful threats were initially entered via email attachments and 45 percent of attacks were executed by users clicking web links in email, according to the SANS Cyber Security Survey.
Reason 2: Email-based attacks affect the entire organization
An average business user receives 4,380 potentially malicious emails every year, according to the Verizon 2017 Data Breach Investigation Report
Reason 3: Your email security filter only catches known threats
Using a global analysis of fingerprint and reputational elements, new email security technologies complement existing email security by combining global and local analysis. Global analysis of email and email-borne threats enables learning form the past to predict the future
Having a robust, effective email security solution has been a necessity for most organization today. It is the responsibility of every business to protect themselves, their clients’ and their employees’ bsensitive personal identifying information. Not doing so can amount to a costly breach that can wreak havoc on an organization, resulting in lost money, damaged reputation and a series of layoffs.
What is Phishing
Phishing is a cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need- A request from their bank, for instance, a note from someone in their company- and to click a link or download an attachment
What is the difference between spam and phishing
- Phishing emails are usually targeted to a person. They will often have the person’s name already in the email. Spam is more likely to be less personal
- Phishing usually has a sense of urgency. There may be language like “free to first 50 people”. Spam may not so immediate.
- Phishing Usually is trying to get you to ckick a malicious link or reply to an email (instead of making a phone call)
- Phishing emails are sent much less frequent than spam.
- Phishing emails often are impersonating another company or someone you know. For instance, an email that looks like it’s from your bank but really not. Spam emails usually don’t impersonate or try to trick you into thinking they are someone else.
Secure your email in 5 simple steps
There are 5 simple things you can do to keep hackers at bay!
- Strong password
- Phishing email
- Encryption works
- Microsoft Advanced Threat Protection
- 2 Factor Identification
- Strong Password
- Has 12 characters, minimum.
- Includes Numbers, Symbols, Capital Letters, and Lower Case letters
- Isn’t a dictionary Work or combination of dictionary words
- Doesn’t rely on obvious substitutions
2. Phishing email
If you get an e-mail you’re not sure of – don’t click on anything, do not reply or forward.
Here’s an example of what to look for…
Tip 1: Don’t trust the display name
Tip 2: look but don’t click
Tip 3: Check for spelling mistakes
Tip 4: Analyse the greeting
Tip 5: Don’t give personal information
Tip 6: Beware of urgent or threatening language in the subject line
Tip 7: Review the signature
Tip 8: Don’t click on attachments
Tip 9: Don’t trust the header from email address
Tip 10: Don’t believe everything you see
3. Email Encryption:
What is an end-to-end email encryption?
End-to-end email encryption is a method of transmitting data where only the sender and receiver can read email messages. With end-to-end email encryption, the data is encrypted on the sender’s system
Why is this important?
Only the intended recipient will be able to decrypt and read it. Nobody in between can read the message or tamper with it. End-to-end email encryption provides the highest level of confidentiality and protection to your email communication
How to encrypt your email on Outlook
- Click on “new Email”
- On the new email page click on “file”
- Click on “Encrypt this item”
- Click on “Encrypt Only”
4. Multi Factor Identification
This security technique verifies your identity when you log into a website by requiring you to both know something and have something. The thing you need to know is a username and a password or a PIN, the thing you need to have is, generally, a mobile phone/SMS or code
If you want to use this security, please contact us: Support@rmstech.com.au
5. Microsoft Advanced threat protection
What is it?
Microsoft Office 365 Advanced Threat Protection (ATP) Is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection and includes features to safeguard your organization from hamful links in real time.
How it works
ATP Safe attachment: Provide zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent
- Office 365 ATP includes an advanced reporting dashborard to monitor your ATP performance. You can access it at Report>Dashboard in the security and compliance center
- ATP for sharePoint, OneDrive, and Microsoft Teams: Protect your organization when users collaborate and share files, by identifying and blocking malicious files in team sites and document libraries
- Threat trackers provide the latest intelligence on prevailing cybersecurity issues. For example, you can view information about the latest malware, and take countermeasures before it becomes an actual threat to your organization.
- Attack simulator allows you to run realistic attack scenarios in your organization to identify vulnerabilities. Simulations of current types of attacks are available, including a display name spear phishing attack, a password spray attack, a brute force password attack, and more.
- Microsoft Advanced threat Protection: https://products.office.com/en-au/exchange/advance-threat-protection#
Let’s work together
We can work together to secure your data assets, saving you valuable time