Vous êtes sur la page 1sur 3

EXECUTIVE BRIEF:

WHY ADVANCED THREATS DEMAND


ADVANCED EMAIL SECURITY
Ransomware and unknown threats make email security more crucial than ever

Abstract Email usage continues to increase

In today’s hyper-connected world, email-based communications Regardless of the proliferation of text and social media, email
are not just commonplace – they have become a fundamental communication is still growing strong. According to a recent study
cornerstone for effectively conducting business, with the total by the Radicati Group, the total volume of worldwide emails
volume of worldwide emails sent per day projected to increase sent and received reached 205 billion per day, with this volume
by at least 5% every year. Given its ubiquitous nature, email is a projected to increase by at least 5% every year. And, this fact is
1

critical vector that an organization must protect. not lost upon hackers, who are constantly seeking opportunities
to exploit organizations.

1 The Radicati Group, Inc., Email Statistics Report, 2015-2019


E-mail threats organizations face today • Malware – email is one of the top
delivery mechanisms to distribute
Emails offer hackers a vehicle to
Anatomy of an email attack: known & unknown malware,
deliver a variety of vulnerabilities to an
which are typically embedded into
• A CFO gets an email from organization. Some of the more common
email attachments in hopes that
the CEO authorizing an email-borne threats include:
the attachment will be opened or
emergency fund transfer.
• Ransomware – one particularly downloaded onto a computer or
But the email is actually
nefarious malware variant is network, thereby allowing hackers to
from a cybercriminal
ransomware. Once the email gain access to resources, steal data, or
• An employee with attachment is activated, the code crash systems.
administrative rights to key embeds itself on a network and
• Spam – emails are used to deliver spam
systems receives an urgent ransomware typically encrypts or locks
or unsolicited messages, which can
email from IT to update critical files and systems. The hackers
clog inboxes and network resources,
their network password. then coerce the organization to pay an
diminish businesses productivity, and
They actually disclose their extortion fee in order to have the files
increase operational costs.
password to cybercriminals. or systems un-encrypted or unlocked.
Email is the preferred vehicle to deliver • Outbound Email Hijacking –
• An employee receives an
ransomware either through infected corporations are also subject to
email to read an important
attachments or malicious URLs. corporate policies and government
attachment about their
regulations, which hold businesses
benefits provider. When • Spear Phishing / Whaling – in this
accountable for their outgoing emails
they open the attachment, variant of phishing, key IT/networking
and ensuring they protect their
they unknowingly activate individuals or company execs are
customer’s PII. Zombie attacks and IP
hidden Trojan malware. targeted using malware-laced emails
hi-jacking can disseminate customer PII,
appearing to come from a trusted
ruining the reputation of a business.
source, in efforts to gain access to
internal systems & data. Over 90% of
cyber-attacks start with a successful
Conclusion
phishing campaign. 1
Emails communications are essential to
organizations today, something hackers
• Business Email Compromise / CEO
are keenly aware of. Given today’s
Fraud / Impostor email – Over the past
sophisticated and targeted attacks, it’s
few years, Business Email Compromise
paramount that organizations deploy
(BEC) schemes have caused at
a multi-layered security solution that
least $5.3 billion in total losses to
includes dedicated advanced threat
approximately 22,000 enterprises
protection for email. To effectively
around the world, according to the
combat today’s emerging threats,
latest figures from the FBI. The FBI
2

organizations are well-advised to


defines Business Email Compromise
implement a next-generation email
as a sophisticated email scam that
security management solution
targets businesses working with foreign
that provides real-time breach
partners that regularly perform wire
prevention capabilities.
transfer payments.
To learn more about ways to protect your
• Phishing – this common hacker tactic
organization’s emails, read our solutions
utilizes emails with embedded links to
brief What your next-gen email security
hacker sites. When gullible users visit
needs to stop advanced threats.
these sites, they’re prompted to enter
PII (Personably Identifiable Information)
that is in turn used to steal identities,
compromise corporate data, or access
other critical systems.

1 www.verizonenterprise.com/verizon-insights-lab/dbir/2017/
2 www.ic3.gov/media/2016/160614.aspx

2
© 2018 SonicWall Inc. ALL RIGHTS RESERVED. BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE,
SonicWall is a trademark or registered trademark of SonicWall OR NON- INFRINGEMENT. IN NO EVENT SHALL SONICWALL
Inc. and/or its affiliates in the U.S.A. and/or other countries. All AND/OR ITS AFFILIATES BE LIABLE FOR ANY DIRECT,
other trademarks and registered trademarks are property of INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR
their respective owners. INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION,
DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION
The information in this document is provided in connection OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR
with SonicWall Inc. and/or its affiliates’ products. No license, INABILITY TO USE THIS DOCUMENT, EVEN IF SONICWALL
express or implied, by estoppel or otherwise, to any intellectual AND/OR ITS AFFILIATES HAVE BEEN ADVISED OF THE
property right is granted by this document or in connection with POSSIBILITY OF SUCH DAMAGES. SonicWall and/or its
the sale of SonicWall products. EXCEPT AS SET FORTH IN THE affiliates make no representations or warranties with respect to
TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE the accuracy or completeness of the contents of this document
AGREEMENT FOR THIS PRODUCT, SONICWALL AND/OR and reserves the right to make changes to specifications and
ITS AFFILIATES ASSUME NO LIABILITY WHATSOEVER product descriptions at any time without notice. SonicWall Inc.
AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY and/or its affiliates do not make any commitment to update the
WARRANTY RELATING TO ITS PRODUCTS INCLUDING, information contained in this document.

About Us

SonicWall has been fighting the cyber-criminal industry for


over 25 years, defending small, medium size businesses and
enterprises worldwide. Our combination of products and
partners has enabled a real-time cyber defense solution tuned to
the specific needs of the more than 500,000 businesses in over
150 countries, so you can do more business with less fear.

If you have any questions regarding your potential use of this


material, contact:

SonicWall Inc.
1033 McCarthy Boulevard
Milpitas, CA 95035

Refer to our website for additional information.


www.sonicwall.com

ExecBrief-WhyAdvThreats-US-KJ-MKTG2004

Vous aimerez peut-être aussi