fbpx

Email Security Recommendations YOU SHOULD LOOK AT from 2021

With contributions from Jamal “Jay” Bethea, Cisco Secure Email Product Marketing Manager

Think email security isn’t complicated; think again. Not merely is email the #1 attack vector, but regulatory compliance requirements across sectors ensure it is difficult to learn which data protection laws are for the industry. Now mix in architectural changes that support cloud productivity suites like Microsoft 365 and Google’s G-Suite to accelerate your organization to cloud-based email security services.

Remote work has magnified the threats businesses and users face online daily. With regards to safeguarding email against today’s advanced threats like malware and phishing information is power. We are providing you a sneak peek into our tips for email security predicated on 2021 trends which will be out later this season.

This is a brief overview of the 2021 Email Security Recommendations:

 
    1. Spam and Unwanted Email Detection: For some organizations, spam & unwanted email volumes are running in the reduced 80% of these entire email volume. Right away, the factor to the volumes of email is your downstream security engines are maximizing your connection filtering catch rates using technologies such as for example IP Reputation and also better domain reputation. Also, in this certain area will be the inbound DMARC and manage quarantined email controls.
    1. BEC & Advanced Phishing Control: An essential area for just about any email security solution, the effective capability may vary between different solutions significantly, and even then, some organizations might need more third party solutions if attacks continue. Traditional technologies work by detecting the known malicious email here, attempted spoofing attempts, etc. However, the usage of emerging technologies has exploded, given the growth of AI-driven capabilities to recognize good to malicious emails.
    1. Email Attachments: 1 of 2 main solutions to penetrate security defenses with malicious content by email. Cloud sandboxing and signature-driven malware scanners can certainly help in detecting unknown or known malware. An extra safeguard to malware detection, organizations also elect to unpack password-protected files and disarm embedded URL links in PDF files or macros in office documents.
    1. Embedded URLs: The next way for malicious content to enter a business can go unaddressed in a few cloud-based productivity suites. Vendors shall re-write embedded URLs, when a user clicks on the URL, it really is scanned to investigate the potential threat. Furthermore, emerging detection technologies like cloud sandboxing may be used of this type while also minimizing email delays effectively.
    1. Internal Email Scanning: Account DOMINATE (ATO) is really a new threat to organizations. ATOs have targeted organizations that adopt cloud productivity suites. You need to prioritize and check with your email security vendor to verify coverage and available support. Organizations should think about multi-factor authentication across their email security clients such as for example Outlook.
    1. User Awareness Training: Training. Training. In lots of ways, the buck stops with anyone who clicks, opens, or reads a contact. End-user security awareness equips organizations with curriculums and immersive testing from phishing simulations. If users become high-risk, email administrators can apply a far more stringent scanning profile.
    1. External Domain Protection: Make sure you or authorized third party vendors’ email reaches its destination with DMARC controls to authenticate emails. Another significant advantage this is actually the capability to identify any unauthorized servers sending a contact using your domains, such as a phishing campaign making use of your organization’s brand to inflict collateral harm to your reputation.
    1. Bi-directional SecOps Integration: Organizations are exporting email log data into centralized SIEMS for analysis. They ought to also assess their SecOps orchestration and automation platforms and how they integrate back to your email platform. That real way, the platforms can apply remediation or update protection policies without looking forward to a console user to accomplish it manually.

Everyone is susceptible to malicious attacks like ransomware which means that your assessment ought never to start and stop with this recommendations. Cisco Secure Email can simplify your email security management and drive back email-borne threats regardless of the quantity or complexity.

      Find out more           about how exactly Cisco Secure Email supplies the best protection for the email against cyber threats.