Why is Protecting my email important?  

Reason1: Email is the most common IT security threat for organizations 

An estimated 75 percent of identified, impactful threats were initially entered via email attachments and 45 percent of attacks were executed by users clicking web links in email, according to the SANS Cyber Security Survey. 

Reason 2: Email-based attacks affect the entire organization 

An average business user receives 4,380 potentially malicious emails every year, according to the Verizon 2017 Data Breach Investigation Report 

Reason 3: Your email security filter only catches known threats 

Using a global analysis of fingerprint and reputational elements, new email security technologies complement existing email security by combining global and local analysis. Global analysis of email and email-borne threats enables learning form the past to predict the future 

Having a robust, effective email security solution has been a necessity for most organization today. It is the responsibility of every business to protect themselves, their clients’ and their employees’ bsensitive personal identifying information. Not doing so can amount to a costly breach that can wreak havoc on an organization, resulting in lost money, damaged reputation and a series of layoffs.  

What is Phishing 

Phishing is a cyber-attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need- A request from their bank, for instance, a note from someone in their company- and to click a link or download an attachment 

What is the difference between spam and phishing 

  • Phishing emails are usually targeted to a person. They will often have the person’s name already in the email. Spam is more likely to be less personal 
  • Phishing usually has a sense of urgency. There may be language like “free to first 50 people”. Spam may not so immediate. 
  • Phishing Usually is trying to get you to ckick a malicious link or reply to an email (instead of making a phone call) 
  • Phishing emails are sent much less frequent than spam. 
  • Phishing emails often are impersonating another company or someone you know. For instance, an email that looks like it’s from your bank but really not. Spam emails usually don’t impersonate or try to trick you into thinking they are someone else. 

Secure your email in 5 simple steps

There are 5 simple things you can do to keep hackers at bay!

  1. Strong password  
  2. Phishing email 
  3. Encryption works 
  4. Microsoft Advanced Threat Protection 
  5. 2 Factor Identification 
  1. Strong Password 
  • Has 12 characters, minimum. 
  • Includes Numbers, Symbols, Capital Letters, and Lower Case letters 
  • Isn’t a dictionary Work or combination of dictionary words
  • Doesn’t rely on obvious substitutions

2. Phishing email 

If you get an e-mail you’re not sure of – don’t click on anything, do not reply or forward.

Here’s an example of what to look for…

Tip 1: Don’t trust the display name 

Tip 2: look but don’t click 

Tip 3: Check for spelling mistakes 

Tip 4: Analyse the greeting 

Tip 5: Don’t give personal information 

Tip 6: Beware of urgent or threatening language in the subject line 

Tip 7: Review the signature 

Tip 8: Don’t click on attachments 

Tip 9: Don’t trust the header from email address 

Tip 10: Don’t believe everything you see 

3. Email Encryption:  

What is an end-to-end email encryption? 

End-to-end email encryption is a method of transmitting data where only the sender and receiver can read email messages. With end-to-end email encryption, the data is encrypted on the sender’s system 

Why is this important?

Only the intended recipient will be able to decrypt and read it. Nobody in between can read the message or tamper with it. End-to-end email encryption provides the highest level of confidentiality and protection to your email communication 

How to encrypt your email on Outlook 

  1. Click on “new Email” 
  2. On the new email page click on “file” 
  3. Click on “Encrypt this item” 
  4. Click on “Encrypt Only” 

4. Multi Factor Identification 

This security technique verifies your identity when you log into a website by requiring you to both know something and have something. The thing you need to know is a username and a password or a PIN, the thing you need to have is, generally, a mobile phone/SMS or code 

If you want to use this security, please contact us: Support@rmstech.com.au 

5. Microsoft Advanced threat protection 

What is it? 

Microsoft Office 365 Advanced Threat Protection (ATP) Is a cloud-based email filtering service that helps protect your organization against unknown malware and viruses by providing robust zero-day protection and includes features to safeguard your organization from hamful links in real time.  

How it works 

ATP Safe attachment: Provide zero-day protection to safeguard your messaging system, by checking email attachments for malicious content. It routes all messages and attachments that do not have a virus/malware signature to a special environment, and then uses machine learning and analysis techniques to detect malicious intent 

  • Office 365 ATP includes an advanced reporting dashborard to monitor your ATP performance. You can access it at Report>Dashboard in the security and compliance center 
  • ATP for sharePoint, OneDrive, and Microsoft Teams: Protect your organization when users collaborate and share files, by identifying and blocking malicious files in team sites and document libraries 
  • Threat trackers provide the latest intelligence on prevailing cybersecurity issues. For example, you can view information about the latest malware, and take countermeasures before it becomes an actual threat to your organization. 
  • Attack simulator allows you to run realistic attack scenarios in your organization to identify vulnerabilities. Simulations of current types of attacks are available, including a display name spear phishing attack, a password spray attack, a brute force password attack, and more.  
  • Microsoft Advanced threat Protection:  https://products.office.com/en-au/exchange/advance-threat-protection#  

Let’s work together 

We can work together to secure your data assets, saving you valuable time