Top Banner
At best SPAM is a productivity killer. At worst, it can be the conduit to a virus that will plant spyware or take down your network. BREACH OF PRIVACY ACT RUINED REPUTATION STOLEN INTELLECTUAL PROPERTY SYSTEM DOWNTIME Spoofing emails impersonate someone else in order to trick the target into doing something they might not ordinarily do. (Could be as simple as clicking a link.) How can you tell if you’ve been Phished or Spoofed? Look for mispelled words, bad grammar, threats, and unexpected emails from a popular company. WHAT DO THEY DELIVER? HOW SHOULD YOUR COMPANY RESPOND? PROTECT YOUR NETWORK BY USING... Contact the IT department immediately upon receiving a suspicious email. If any of your machines were breached, disconnect them from your network. Determine the extent of data that was compromised. Notify the affected parties inside and outside your business. Better yet...stop email security breaches BEFORE THEY HAPPEN! Sources: Kaspersky Lab. “Spam in Q3 2013.” Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011 A Chronology of Data Breaches, Privacy Rights Clearinghouse, June 2013 Symantec. “2013 Norton Report.” smallbusiness.chron.com. “How a Company Should Respond to a Security Breach.” to make email security EVERYONE’S BUSINESS WHY& HOW WHAT’S THE BIG DEAL ABOUT EMAIL SECURITY? ADWARE TROJANS ROOTKITS SPYWARE WORMS KEYLOGGERS VIRUSES SPOOFING 3,763 38 billion 3.9 % 68.3 % 378 million According to Kaspersky Lab, in Q3, 2013 3.9% of all email sent contains malicious attachments and 68.3% of all email traffic can be considered SPAM. Since January 2005, 608,087,870 records have been exposed in 3,763 data breaches in the U.S. 2 There are 378 million victims of cybercrime each year; 1 million victims each day—12 victims per second. 3 Cybercrime cost US companies $38 billion in 2013. 3 10 % ! WHAT COULD AN INFORMATION SECURITY BREACH MEAN FOR YOUR COMPANY? WHERE DO ATTACKS COME FROM? Phishing emails appear to come from a trusted source like your email provider, phone company, etc. and are designed to steal personal information. (Usually asks for personal data, login information, etc) PHISHING ? @ Or... work with a partner who can implement all of this for you. Sendio’s email security technology combines a set of tightly integrated layers that eliminate malicious threats and spam campaigns. www.sendio.com Employ an effective SMTP defense technique that defeats common spammer automation behaviors. Protect your organization from identity theft and other phishing schemes that attempt to steal personal or corporate information such as on-line banking logins. Using techniques similar to modern social networks, self-manage a community of permitted email senders for each user in your organization. Constantly update virus signatures for both email body and attachments. SILVERLISTING ANTI-SPOOFING TECHNOLOGY EMAIL COMMUNITIES ANTI-VIRUS SOFTWARE Identify malicious senders with pattern matching that can source senders’ IP addresses. IP ADDRESS REPUTATION $ Through 2016, the financial impact of cybercrime will grow 10% per year. 1
1

WHAT’S THE BIG DEAL ABOUT EMAIL SECURITY 378 · 2017-08-18 · Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011 ... June 2013 Symantec. “2013 Norton

May 22, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WHAT’S THE BIG DEAL ABOUT EMAIL SECURITY 378 · 2017-08-18 · Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011 ... June 2013 Symantec. “2013 Norton

At best SPAM is a productivity killer. At worst, it can be the conduit to a virus that will plant spyware or take down your network.

BREACH OF PRIVACY ACT

RUINED REPUTATION

STOLEN INTELLECTUAL

PROPERTY

SYSTEM DOWNTIME

Spoofing emails impersonate someone else in order to trick the target into doing something they might not ordinarily do. (Could be as simple as clicking a link.)

How can you tell if you’ve been Phished or Spoofed?Look for mispelled words, bad grammar, threats, and unexpected emails from a popular company.

WHAT DO THEY DELIVER?

HOW SHOULD YOUR COMPANY RESPOND?

PROTECT YOUR NETWORK BY USING...

Contact the IT department immediately upon receiving a suspicious email.

If any of your machines were breached, disconnect them from your network.

Determine the extent of data that was compromised.

Notify the affected parties inside and outside your business.

Better yet...stop email security breaches BEFORE THEY HAPPEN!

Sources: Kaspersky Lab. “Spam in Q3 2013.” Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011 A Chronology of Data Breaches, Privacy Rights Clearinghouse, June 2013Symantec. “2013 Norton Report.” smallbusiness.chron.com. “How a Company Should Respond to a Security Breach.”

to make email security EVERYONE’S BUSINESS

WHY &HOW

WHAT’S THE BIG DEAL ABOUT EMAIL SECURITY?

ADWARE TROJANS ROOTKITS SPYWARE WORMS KEYLOGGERS VIRUSES

SPOOFING

3,763

38billion

3.9%

68.3%

378million

According to Kaspersky Lab, in Q3, 2013 3.9% of all email sent contains malicious attachments and 68.3% of all email traffic can be considered SPAM.

Since January 2005, 608,087,870 records have been exposed in 3,763 data breaches in the U.S.2

There are 378 million victims of cybercrime each year; 1 million victims each day—12 victims per second.3

Cybercrime cost US companies $38 billion in 2013.3

10%

!

WHAT COULD AN INFORMATION SECURITY BREACH MEAN FOR YOUR COMPANY?

WHERE DO ATTACKS COME FROM?

Phishing emails appear to come from a trusted source like your email provider, phone company, etc. and are designed to steal personal information. (Usually asks for personal data, login information, etc)

PHISHING

?

@

Or... work with a partner who can implement all of this for you. Sendio’s email security technology combines a set of tightly integrated layers that eliminate malicious threats and spam campaigns.

www.sendio.com

Employ an effective SMTP defense technique that defeats common spammer automation behaviors.

Protect your organization from identity theft and other phishing schemes that attempt to steal personal or corporate information such as on-line banking logins.

Using techniques similar to modern social networks, self-manage a community of permitted email senders for each user in your organization.

Constantly update virus signatures for both email body and attachments.

SILVERLISTING

ANTI-SPOOFING TECHNOLOGY

EMAIL COMMUNITIES

ANTI-VIRUS SOFTWARE

Identify malicious senders with pattern matching that can source senders’ IP addresses.

IP ADDRESS REPUTATION

$

Through 2016, the financial impact of cybercrime will grow 10% per year.1