How to maintain security when employees work remotely: Advice from Leading Security Experts
- by Brittany Day
It is no secret that 2020 has been a year of rapid transformation for businesses. Companies worldwide have been forced to quickly become more digital in the way that they operate, and many have transitioned to a largely remote workforce. Businesses have become increasingly reliant upon inherently insecure cloud platforms like Office 365 and G Suite to fulfill their communication and collaboration needs. While these changes have introduced certain advantages in terms of efficiency and productivity, they have also brought on significant challenges - namely, effectively securing cloud email in this increasingly complex and dangerous threat environment.
To help you secure your remote workforce online without a hiccup in productivity, we will begin by briefly examining the modern email threat environment. We will then explore top tips and advice for securing cloud email from leading security experts including Gartner, the FBI and Guardian Digital - the open source email security company.
The Modern Digital Threat Environment
Digital risk has skyrocketed, driven by sophisticated attacks targeting cloud email users. Cyber criminals recognize that email is the preferred method for sharing sensitive data and a key communication channel that businesses cannot afford to lose access to for any period of time. Rushed deployments of vulnerable cloud platforms, overworked IT staff and an increase in inadequately secured endpoints has provided threat actors with the perfect opportunity to trick employees working remotely into sharing sensitive credentials and downloading destructive malware on their systems.
Thirty percent of credential phishing attempts bypass existing cloud email security defenses and are opened by target users.
- United States Federal Bureau of Investigation (FBI)
Without layered supplementary security defenses in place, cloud email users are highly vulnerable to credential phishing attacks and account takeovers. The FBI reports that 30% of credential phishing attempts bypass existing cloud email security defenses and are opened by target users. And mistakenly opening a phishing email is more dangerous than ever - users are now three times more likely to click on a malicious link embedded in a phishing email and then disclose their account credentials than they were pre-COVID.
Safeguarding Remote Workers Online: What The Experts Recommend
When it comes to protecting your remote workforce in this heightened digital threat environment, email security should be the top priority, as over 90% of all cyberattacks begin with a phishing email. Effectively securing cloud email against targeted modern spear phishing, ransomware and CEO fraud attacks requires a multi-layered supplementary email security solution accompanied by ongoing, expert management, monitoring and support services.
A strategic approach to security that layers inbound, outbound and internal detection and remediation is essential to cloud email defense.
Microsoft and Google specialize in providing flexible, cost-effective cloud email services, but have proven to be incompetent in securing them. Built-in cloud email security defenses provided by Microsoft and Google are primitive, single-layered and insufficient in detecting and blocking today’s sophisticated and evasive attacks like fileless malware and email account compromise (EAC) scams. Due to the inherent uniformity of cloud platforms, cyber criminals can open any account and test their methods until they are able to bypass default filters. This uniformity then enables them to conveniently reuse the same attack on thousands of different accounts.
Cyber thieves are leveraging sophisticated COVID-related business email compromise (BEC) scams to steal credentials. Businesses should take immediate action to protect their users and their data by implementing critical additional layers of protection in Office 365 and G-Suite.
- United States Federal Bureau of Investigation (FBI)
To fortify Office 365 and G Suite email against today’s advanced exploits, it is critical that businesses implement additional protection designed to seamlessly integrate with their existing infrastructure, filling key gaps in Microsoft and Google’s built-in defenses with additional layers of real-time security designed to work harmoniously to identify and respond to both persistent and emerging attacks. To safeguard the inbox and protect remote workers, Gartner security experts recommend “a strategic approach to security that layers inbound, outbound and internal detection and remediation”. The FBI has also continually emphasized the heightened importance of taking a defense-in-depth approach to securing business email, warning: “Sophisticated COVID-related business email compromise (BEC) scams are being used to steal credentials. Businesses should take immediate action to protect their users and their data and implement critical additional layers of protection in Office 365 and G-Suite.”
Securing business email is an ongoing process that requires around-the-clock monitoring, maintenance and support provided by a team of security experts. At Guardian Digital, we serve as the front line of defense against cyber thieves, becoming a permanent extension of each of our client's technical team.
- Dave Wreski, CEO, Guardian Digital
Businesses - especially SMBs who often lack IT resources and security expertise - should select an email security provider that offers managed services and accessible support. Failure to implement a solution accompanied by continual, expert management, system monitoring and support services often leaves businesses vulnerable to attack - even with supplementary email defenses in place. Guardian Digital CEO Dave Wreski explains: “An effective email security solution cannot simply be selected and purchased, leaving the responsibility of configuration and management in the hands of the administrator. Rather, securing business email is an ongoing process that requires around-the-clock monitoring and maintenance by a team of experts, dedicated to understanding the evolving risks businesses face and applying the specific real-time guidance necessary to each individual business. Wreski elaborates: “The unfortunate reality is that many email security solutions put the burden of setup, maintenance and system monitoring on the administrator. At Guardian Digital, we assume these responsibilities for our clients, simplifying administration and serving as the front line of defense against cyber thieves. We build on the protection that our all-in-one security suite - EnGarde Cloud Email Security - provides, becoming a permanent extension of each of our client's technical team.”
Although implementing a multi-layered solution accompanied by fully-managed services is the single most important step businesses can take toward protecting remote workers in this heightened digital threat environment, administrators should also convey the importance of engaging in safe online behaviors and cybersecurity best practices, including:
- Watch out for phishing, ransomware impersonation scams.
- Don’t rely on endpoint security like desktop antivirus alone - the endpoint should be the last line of defense. If something goes wrong, it provides malicious hackers with easy access to your system.
- Use a VPN to encrypt data between you and your server. When selecting a VPN, watch for pitfalls such as free VPNs which often carry inherent security flaws and privacy issues of their own.
- Setup two-factor or multi-factor authentication on any account that allows it, and never disable it.
- Ensure that your operating system and all applications are updated - remember that your operating system and applications are only as secure as their latest security patches.
- Be wary of emails from personal email addresses.
- Be cautious with links and attachments. Make sure that you have malicious URL protection and sender authentication protocols in place to protect against phishing, spoofing and impersonation scams. Ideally, these defenses should be implemented as part of a comprehensive, multi-tiered email security solution.
- Be careful with what you share on social media - it can give a scammer all the information he or she needs to guess your password or answer security questions.
- Think before you click! Take adequate time to thoroughly evaluate each email you receive before engaging with it in any way. Be wary of urgent requests pressing you to act quickly.
Ready to simplify administration and safeguard your remote workforce with a threat-ready, fully-supported cloud email security solution? Get A Quote>
- Thinking Strategically about Email Security in 2021 and Beyond
- There’s a Lot to be Gained with Effective Email Security
- Behind the Shield: EnGarde Cloud Email Security Explained
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
- Top Tips and Advice for Staying Safe Online in a Work-from-Home World
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Why Your Business Needs Better Email Security
- Why Ransomware is a Threat to Business
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Why Office 365 Users Are Moving Away from Relying on Default Email Protection Alone
- What You Need to Know to Shield Your Business from Ransomware
- Why You Need DMARC to Secure Email against Spoofing Attacks & Sender Fraud
- Biden's Cybersecurity Efforts Highlight the Power of this Key Technology
- Shortcomings of Endpoint Security in Securing Business Email
- Open Source Utilization in Email Security Demystified
- Limitations of Microsoft 365 Email Security & How To Close These Dangerous Gaps
- DMARC Quarantine vs. Reject: Which Should You Implement to Secure Business Email against Sender Fraud?
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2021
- TLS Email Encryption Explained - How To Encrypt Email with TLS
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: A Passionate Engineer Brings the Power of Open Source to Business Email Security
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- The Remote Worker's Guide to Safely Navigating Office 365
- Why Your Business Needs Superior Email Protection
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How to maintain security when employees work remotely: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- SPF, DKIM & DMARC: Definition & How They Secure Email Against Sender Fraud?
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Are Zero-Day Attacks & How Can I Prevent Them?
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail