State of the Email Union

A recent report from Mimecast was released recently. It showed some current worries and issues that some 1200 IT decision makers have experience and concerns over, in particular Email Security

Key Takeaway

Over the last 12 months, 67% of businesses surveyed have seen an increase in Business Email Compromise (BEC) and impersonation (whaling) attacks and a staggering 54% increase in Phishing attacks on its users.

Business Email Compromise

BEC typically refers to phishing, spear phishing, invoice scams and other email fraud – think the requests from Apple or Paypal that ask you to visit a site that looks like the supplier but want to capture your credentials for criminal use.

Impersonation Attacks, or Whaling

This is all about an attacker impersonating a person in authority in your business. A typical example of this would be an attacker sending in to the business an email spoofed to look like it was from your CEO. The email is sent to the Head of Finance, with the CEO saying to them that they have signed a new contract with a new supplier, please pay £10k into this bank account by the end of the day.

There are a number of areas that businesses can look at reviewing and implementing to help, there is always a product or service available. When it comes to IT and email security, there is nothing that will be 100% effective.

When we consult with businesses, one of the simplest areas to review is user education. Educate your users and employees on the dangers of email borne attacks, and help them to recognise the indicators that something isn’t quite right.

Another area for review is processes and procedures around payments and financials. Make sure there are checks and processes in place, tested, that ensures that the correct payments go out, authorised, to the correct accounts.

Past Blogs

benefits of cybersecurity

Benefits of CyberSecurity

The benefits of cybersecurity. With vast amounts of information are stored online, the benefits of robust cybersecurity are more vital than ever. At Network &...
what is dmarc

What is DMARC

What is DMARC and Why Does Your Business Need It? When it comes to protecting your business from cyber threats, email security is often overlooked. Yet, email is one of...
Why is password management software important

Why is Password Management Software Important

Why is Password Management Software Important for Your Business? In today’s digital world, passwords are the keys to your business’s most sensitive information. From...
What is Email Filtering ?

What is Email Filtering and Why Every Business Needs It

Email is the lifeblood of business communication, but it’s also one of the most vulnerable entry points for cyberattacks. According to research, 96% of cyber threats...
What’s your business’s view on Return to Office?

What’s your business’s view on Return to Office?

Do you love keeping your employees happy by allowing them to work remotely? Or do you think everyone is more productive in the office? Businesses are divided on this...
Outdated backup systems could leave your business vulnerable

Outdated backup systems could leave your business vulnerable

When did you last review your business’s backup tools? Outdated backup systems can fail to protect you from modern threats, like ransomware attacks. If you want a...
Microsoft’s fixing this annoying Windows 11 fault

Microsoft’s fixing this annoying Windows 11 fault

Fed up seeing useless “Recommendations” in the Windows 11 Start menu? Good news – Microsoft’s making them more helpful. Here’s how the improvements could help your team...
Beware that corrupted email attachment: It could be a scam

Beware that corrupted email attachment: It could be a scam

Cyber criminals get more creative every day. The latest scam designed to steal your business data uses corrupted Word files – and getting fooled is easier than you...
Are your employees your security’s weakest link?

Are your employees your security’s weakest link?

Great employees have the same goals you do. But while they’re working hard to help your business succeed, they could accidentally be opening the door to cyber...
The two big threats of doing business on public Wi-Fi

The two big threats of doing business on public Wi-Fi

Public Wi-Fi can be a lifesaver when you must send an urgent email while out of the office. But did you know it can also put your business data at risk? These are the...