State of the Email Union

A recent report from Mimecast was released recently. It showed some current worries and issues that some 1200 IT decision makers have experience and concerns over, in particular Email Security

Key Takeaway

Over the last 12 months, 67% of businesses surveyed have seen an increase in Business Email Compromise (BEC) and impersonation (whaling) attacks and a staggering 54% increase in Phishing attacks on its users.

Business Email Compromise

BEC typically refers to phishing, spear phishing, invoice scams and other email fraud – think the requests from Apple or Paypal that ask you to visit a site that looks like the supplier but want to capture your credentials for criminal use.

Impersonation Attacks, or Whaling

This is all about an attacker impersonating a person in authority in your business. A typical example of this would be an attacker sending in to the business an email spoofed to look like it was from your CEO. The email is sent to the Head of Finance, with the CEO saying to them that they have signed a new contract with a new supplier, please pay £10k into this bank account by the end of the day.

There are a number of areas that businesses can look at reviewing and implementing to help, there is always a product or service available. When it comes to IT and email security, there is nothing that will be 100% effective.

When we consult with businesses, one of the simplest areas to review is user education. Educate your users and employees on the dangers of email borne attacks, and help them to recognise the indicators that something isn’t quite right.

Another area for review is processes and procedures around payments and financials. Make sure there are checks and processes in place, tested, that ensures that the correct payments go out, authorised, to the correct accounts.

Past Blogs

This Small Change to Teams Will Make Your Meetings Run Smoother

If you’ve ever been in a Teams meeting where you’ve had to say, “next slide, please,” more times than you’d like, you’re not alone. For businesses that rely on online...
Cyber Essentials vs ISO27001

Cyber Essentials vs. ISO 27001: What’s the Difference and Which Is Right for You?

Cybersecurity certifications come in many shapes and sizes, but when it comes to choosing the right framework for your business, the decision often boils down to Cyber...
Overconfident employees: Your hidden cyber security threat?

Overconfident employees: Your hidden cyber security threat?

Your team are smart, right? They’d never fall for a scam email or click a suspicious link. At least, that’s what they think. Here’s why overconfidence could spell...

DMARC & DMARCBIS

What They Are, Why They Matter, and What Business Owners Need to Know If you’re a business owner, chances are you rely on email every day—whether it’s communicating...
Could automation save you from spreadsheet headaches?

Could automation save you from spreadsheet headaches?

Spreadsheets slow us down and are too easy to mess up. So, what if I told you there’s a better way to handle data in your business?

Did you notice Incognito mode’s improved privacy?

Did you notice Incognito mode’s improved privacy?

If your team use Google Chrome’s Incognito mode, you probably assume your browsing is private. But until Microsoft spotted this big flaw, your info could be shared...
Copilot could soon auto-open in Microsoft Edge

Copilot could soon auto-open in Microsoft Edge

Is Edge your business’s browser of choice? Microsoft’s thinking of automatically opening Copilot when you use it. It could boost productivity, but there are privacy...
How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news...
How to create secure passwords

How to create secure passwords

Weak passwords are one of the biggest security risks to your business. Why? Because cyber criminals are getting smarter than ever before. If they manage to crack just...
Beware these common ‘malvertising’ attacks

Beware these common ‘malvertising’ attacks

Ever clicked an online ad and wondered afterwards if it was a scam?… most of us have – and cyber criminals want us to keep doing it. Here’s what to look out for...