Article Index

Information Technology (IT)

Email is the attack vector of choice among cybercriminals, and email-borne threats are constantly evolving to become more prevalent, advanced and dangerous. Research by Verizon reveals that over 90% of cyberattacks are carried out via email. Because of this, it is imperative that service providers and other businesses in the technology industry have a sound email security strategy in place to protect both themselves and their clients from phishing, ransomware and other malicious threats. 

Lately, spear phishing attacks targeting businesses in the technology sector have taken a new twist: attackers are asking for documents to be sent to them as opposed to hacking into systems and stealing these confidential files themselves. A popular tactic around tax time has been for threat actors to pose as a CEO and ask for employee W-2s to be forwarded to them. This is what happened in the notorious 2016 data breach that Snapchat experienced. A threat actor posing as Snapchat CEO Evan Spiegel emailed an employee in the payroll department and made a W-2 request. The employee, not carefully checking the email address, forwarded sensitive information including Social Security numbers and stock holdings to the attacker.

Technology companies could be doing much more to protect individuals and organisations from the threats posed by spear phishing. Cloud email providers are in the email business - not the email security business - and take a broad-brush approach to protecting users. More focused protection is needed because the specific threats that each business faces are unique. Companies in the Information Technology sector should be utilizing a solution that identifies the biggest threats within an organization and implements a complete, end-to-end information protection program with advanced encryption technologies, mitigating the risk of data leaks and breaches.

Learn why AT&T New Zealand is securing its business email with Guardian Digital 

We’ve also compiled a list of general technology best practices that organizations can follow to protect their business in any industry.

Must Read Blog Posts

Latest Blog Articles

Recommended Reading