In recent years, online users have increasingly found themselves the target of spam emails. These unwanted messages flood inboxes after personal email addresses are shared with or sold to marketing and sales firms. While many email service providers, such as Gmail, offer spam filters to protect users, digital marketers are constantly evolving new methods to bypass these defenses.

To combat this growing issue, Gmail, the email service provided by Alphabet Inc., is taking a significant step forward with the introduction of a new feature designed to prevent spam and protect users’ privacy. This feature, dubbed “Shielded Email Service,” aims to allow users to create temporary email addresses for use during sign-ups or online interactions, thereby minimizing the risks associated with sharing a personal email address.

The concept behind the Shielded Email Service is straightforward yet highly effective. Users will be able to generate a temporary email address that they can use for short-term purposes, such as signing up for websites, apps, or online stores. These temporary addresses will be valid for a set period, ranging from as short as 10 minutes to as long as 24 hours, depending on the user’s needs.

The real benefit of this feature lies in its customization options. For instance, when signing up for a shopping website or an online service, users can generate a temporary email address that hides their primary email, reducing the likelihood of their real address being exposed to unwanted parties. This temporary email can be discarded after the task is completed, leaving the user’s primary address safe from spam or marketing overload.

Another key advantage of the Shielded Email Service is that important emails sent to the temporary address will still be forwarded to the user’s primary inbox. This feature ensures that critical communications are not missed, while also keeping the user’s personal email address secure from spammy or unsolicited messages. Essentially, this strikes a balance between convenience and privacy.

While the Shielded Email Service offers a promising solution to the spam problem, it may not entirely eliminate the risks of unwanted emails in the long run. Over time, marketers and spammers are likely to adapt and find ways to bypass such protections. Therefore, for users seeking more comprehensive and long-term protection, manually refining spam filters and customizing keyword blocklists could still be a more effective strategy for managing unwanted content.

In addition to the rollout of the Shielded Email Service, Gmail users are being alerted about new data storage policies. Google is notifying its users about storage limits and is encouraging them to opt for premium plans in order to enjoy unlimited storage or up to 1TB of storage space. This change means that Gmail users will no longer need to worry about deleting important files, photos, videos, attachments, or backups from their cloud storage. Instead, they can opt for a premium storage plan, ensuring that their digital memories and data are safely stored without the fear of running out of space.

In conclusion, Gmail’s new Shielded Email Service provides a smart and timely solution to the rising problem of spam, offering users greater control over their online privacy and interactions. However, users seeking the most robust protection against unwanted emails may still find value in refining their spam filters manually. Meanwhile, Google’s emphasis on expanding storage options reflects its ongoing commitment to enhancing user experience and accommodating the growing digital storage needs of its vast user base.

The post Gmail to start Shielded Email Service for SPAM appeared first on Cybersecurity Insiders.

Google’s widely used email service, Gmail, is set to strengthen its security measures by incorporating its advanced AI tool, Gemini AI. This integration aims to provide users with a safer email experience, particularly by combating spam and malware threats effectively.

With the implementation of Gemini AI, Gmail will now introduce a slight delay in the delivery of emails containing attachments. This delay is necessary as the system scans these attachments for malicious software in secure virtual environments before they reach users’ inboxes. This precautionary step is designed to ensure that the 3.45 billion active Gmail users are protected from potential security risks associated with harmful files.

In addition to the scanning process, Gmail users will have access to customization features that enhance their email filtering capabilities. By adjusting these settings, users can fine-tune how emails are managed as they arrive in their inbox. For example, Gemini AI will automatically divert suspicious emails to the spam folder, offering an additional layer of defense against malicious attacks.

However, users should be aware that this sophisticated AI may sometimes misinterpret legitimate emails. For instance, important communications such as bank statements, ISP bills, or credit card reminders might inadvertently be flagged as spam based on their subject lines. In some cases, this could prevent these emails from reaching the inbox entirely, or require user intervention to recover them. Gmail’s spam filters work by analyzing the semantic content of emails, which means that legitimate messages can occasionally be caught in the crossfire.

Furthermore, users of Android 14 devices will notice Gemini AI’s influence beyond just email. The AI will also assist in Google Keep Notes and during message composition, enhancing the overall user experience. While some may view this as an interruption, it ultimately serves to improve the accuracy and relevance of user interactions.

This AI-driven feature was initially rolled out in March 2023 to over 10 million Google Workspace users, providing them with premium protection for sensitive data. Now, with the full-scale deployment of Gemini AI, all 3 billion Gmail users can benefit from enhanced classification and protection of their email content automatically.

By leveraging Gemini AI, Google aims to create a more secure email environment, balancing convenience with safety in an increasingly digital world. As this technology continues to evolve, users can expect ongoing improvements in how Gmail manages spam and protects against malicious threats.

The post Google to use Gemini AI to secure Gmail from spam and malware appeared first on Cybersecurity Insiders.

Nearly three years ago, a new wave of scams emerged, targeting individuals through phone calls and emails. Scammers claimed to possess intimate images of their victims and threatened to release them publicly unless a ransom was paid within a specified time frame.

This evolved into what is now known as the “S#$tortion” scam. In these schemes, victims are accused of visiting illicit websites monitored by law enforcement. To keep their browsing history private, the criminals demand payment, threatening to expose the victim’s details on social media, potentially damaging their reputation.

Recent findings from Cofense, an email security firm, reveal that scammers have intensified their tactics. They now threaten victims by claiming to know their exact whereabouts and have pinpointed their physical addresses. To bolster their threats, they send PDF files featuring Google Street View images, which are intended to validate their claims. However, researchers note that while the addresses may correspond to the victim’s general area, they do not show the victim’s actual home or workplace.

These threat actors are demanding payment in cryptocurrency, specifically Bitcoin, and warn that failure to comply will result in the release of personal information to the victim’s contacts on platforms like Facebook and Twitter.

From Google’s perspective, they utilize AI tools to filter out spam and extortion emails, but criminals often craft clever subject lines that bypass these filters, landing in unsuspecting users’ inboxes.

Cofense advises online users to be vigilant. Here are some tips for staying safe:

    a. Avoid clicking on links from unknown sources.
    b. Do not share intimate details, photos, or videos online, especially with people you do not fully trust.
    c. If you receive an email impersonating law enforcement, report it to the authorities.
    d. Never disclose personal information such as phone numbers, passwords, PINs, email addresses, or banking details, even to friends or family.

By remaining cautious and informed, individuals can better protect themselves against these malicious scams.

The post Beware of Google Street View Images Extortion Email Scams appeared first on Cybersecurity Insiders.

In today’s digital age, where email communication is integral to business operations, the threat of Business Email Compromise (BEC) looms large. BEC attacks are sophisticated schemes where cybercriminals manipulate email communication to deceive employees into transferring money or sensitive information. These attacks often result in significant financial losses and reputational damage. To safeguard your organization against BEC, implementing robust defenses and fostering a culture of cybersecurity awareness are crucial. Here’s a comprehensive guide on how to defend against BEC:

1. Educate Your Team:

Awareness Training: Conduct regular training sessions to educate employees about BEC tactics, such as phishing, spoofing, and social engineering.

Recognizing Red Flags: Teach employees to scrutinize email addresses, grammar errors, urgent re-quests, and unusual payment instructions.

2. Implement Technical Controls:

Email Authentication: Use technologies like SPF, DKIM, and DMARC to verify sender identity and detect spoofed emails.

Advanced Threat Protection: Deploy email security solutions that offer advanced threat detection, sand-boxing, and URL filtering to prevent malicious attachments and links.

3. Establish Secure Procedures:

Verification Protocols: Establish multi-factor authentication (MFA) for accessing sensitive systems or approving financial transactions.

Payment Verification: Implement a protocol requiring verbal confirmation or secondary approval for significant fund transfers or changes to payment details.

4. Enhance Email Security Practices:

Email Filtering: Use robust spam filters and email scanners to block suspicious emails before they reach employees’ inboxes.

Encryption: Encourage the use of email encryption for sensitive information to protect data in trans-it.

5. Monitor and Respond:

Incident Response Plan: Develop and regularly update an incident response plan specific to BEC incidents. Ensure all employees know their roles and responsibilities.

Continuous Monitoring: Implement monitoring tools to detect anomalies in email traffic and unusual behaviors indicating potential BEC attempts.

6. Cultivate a Security-Conscious Culture:

Leadership Support: Foster a culture where cybersecurity is prioritized from the top-down, with leadership actively promoting and participating in security initiatives.

Reporting Channels: Provide clear channels for reporting suspicious emails or incidents promptly, without fear of repercussion.

7. Regular Assessments and Updates:

Security Audits: Conduct regular security audits and vulnerability assessments to identify and mitigate potential weaknesses in your email systems and processes.

Stay Updated: Keep software, security patches, and email systems up to date to protect against known vulnerabilities.

8. Collaborate and Share Information:

Industry Collaboration: Engage with industry peers and share insights about emerging BEC tactics and threats to strengthen collective defenses.

Information Sharing: Participate in threat intelligence sharing platforms to stay informed about evolving BEC techniques and indicators of compromise.

By implementing these proactive measures, businesses can significantly reduce the risk of falling victim to Business Email Compromise attacks. Vigilance, education, and technological defenses work in tandem to create a resilient barrier against sophisticated cyber threats.

Remember, defending against BEC is an ongoing effort that requires continuous improvement and adaptation to stay ahead of cybercriminals’ evolving tactics.

The post Defending Against Business Email Compromise: A Comprehensive Guide appeared first on Cybersecurity Insiders.

As the US Elections of 2024 approach, voters must remain vigilant against a rising tide of cybercrime targeting political donations. Several threat groups are deceiving citizens into donating money purportedly for the elections, which turns out to be fraudulent schemes aimed at financial gain.

A recent study by Trellix highlights the urgency for law enforcement to increase vigilance, noting that hackers are leveraging advanced technologies like GenAI to exploit the November 2024 elections for profit. Notably, groups such as China’s Volt Typhoon and Russia’s Sandworm APT have intensified their malicious email campaigns targeting government sectors. Their objectives range from disrupting the upcoming elections to sowing widespread electoral panic.

These cyber operations often involve spreading ransomware and gathering sensitive intelligence, with sectors like telecom, healthcare, and finance being primary targets.

This alarming trend echoes past concerns about foreign interference in US 2016 elections. Following suspicions of cyber influence, an investigation was launched under the Obama administration, although details were largely obscured after Donald Trump assumed the presidency in January 2017.

Now, the resurgence of malicious email campaigns poses a renewed threat, potentially escalating into broader disinformation campaigns that could sway public opinion.

It is imperative that measures are promptly implemented to safeguard electoral integrity and counter these evolving cyber threats. Awareness and proactive security measures are essential to mitigate the impact of such malicious activities on the democratic process.

The post Malicious emails tricking users to make donations for elections appeared first on Cybersecurity Insiders.

Last year, 1 in 3 people in the US were hit by healthcare data breaches in a record year for cyber-attacks on the sector, while this year has already seen one of the most serious attacks in history when Change Health was hit by ransomware gang ALPHV. The ongoing digitalization of health services data may bring convenience for providers and patients alike, but it’s clear that security infrastructure is not keeping up with the rapidly increasing risk level faced by hospitals and the vendors that support them.

Such breaches are disastrous for everyone involved. The immediate impact is a delay in medical treatment if health systems are shut down by an attack, while protected health information (PHI) leaking can result in patients becoming targets for further crimes if sensitive data is sold via online black markets. As for healthcare and healthtech companies, they can be hit with hefty fines for HIPAA violations and find themselves on the receiving end of class action lawsuits, not to mention the reputational damage that might ultimately be more costly in the long run.

It’s too late to put the brakes on digitalization, so what can the healthcare industry do to secure its data?

How healthcare became the number one target for cybercriminals

The healthcare sector is the ideal target for cybercriminals. For one, PHI is especially valuable on the black market due to its sensitivity and the intimate details it reveals about the patient. This data is stored and processed in vast quantities, and a single breach can see attackers take off with thousands or even millions of records. Then there is the massive potential for serious, life-threatening disruption, which means that ransomware attacks can demand a higher price to bring systems back online.

Not only is the incentive high for cybercriminals but there are numerous vulnerabilities they can exploit due to the complexity of today’s healthcare systems. Hospitals, clinics, pharmacies, payment processors, insurance providers, and professional and patient-owned medical devices have all been brought online, all transfer data between them, and all provide vectors for attack. One link in this data supply chain might have airtight security but, if the link next to it is weak, then it is still vulnerable.

As healthcare systems become more vulnerable to attacks, cybercriminals are becoming more sophisticated. For example, where typical attacks used to rely on an unwitting victim downloading executable code, we now see a rise in “fileless attacks” where trusted programs running in memory are corrupted to become malware instead, making them much harder to detect.

The barrier to entry for being a cybercriminal has also lowered thanks to the proliferation of ransomware-as-a-service (RaaS). In the same way software-as-a-service (SaaS) has simplified access to various technologies, RaaS allows people with little to no development knowledge to launch ransomware attacks with “leased” malware. Cybercrime has proven to be an innovative technology sector of its own.

Why emails are still the biggest vulnerability in healthcare cybersecurity

The first and most important step healthcare companies can take to protect themselves is fortifying their email security as it is the most common attack vector in cyber-attacks. Healthcare companies must also scrutinize the security of their entire email supply chain; the massive HCA Healthcare hack that exposed 11 million records — last year’s largest healthcare breach — originated at an external location used for automated email formatting.

Phishing — where seemingly legitimate emails are used to trigger an action in the receiver that creates a vulnerability — is the classic email-based attack, but more concerning is the rise in business email compromise (BEC) attacks. Whereas phishing emails can be detected by email security systems if the sender is flagged as suspicious, BEC attacks are launched from compromised or spoofed legitimate organizational emails, making them more convincing to security systems and users alike.

Basic email security relies on blocklists and greylists — constantly updated records of suspicious IP addresses, sender domains, and web domains — to filter out phishing and spam in real-time, but the rise in BEC attacks has rendered this approach obsolete. Blocklists can even be counterproductive, as a legitimate email address being used to launch an attack can result in an organization’s entire email system or even its wider network being blocked.

There are many steps healthcare companies can take to bolster their email security: mandatory multi-factor authentication (MFA) can prevent unauthorized logins; domain key identified email (DKIM) uses cryptography to ensure emails come from authorized servers; access to distribution lists should be restricted to limit the damage of a BEC attack; and removing open relays can prevent hackers from hijacking trusted mail servers.

But even with deploying multi-layered protection controls, email attacks can bypass security programs as they exploit human gullibility through carefully tuned social engineering. Staff training on how to identify and avoid phishing and BEC attacks can reduce risk but it cannot eliminate it; all it takes is one person in an organization to be compromised for cybercriminals to gain a foothold to launch attacks.

AI is the new arms race between email security and cybercriminals

The sheer scale of the healthcare sector — which accounts for almost 10% of employment in the United States and reaches almost the entire population — means that training-based phishing and BEC attack prevention is always going to be a Band-Aid on a bullet wound. Recent advances in AI technology — particularly machine learning (ML) and large language models (LLMs) — can finally provide effective and scalable mitigation against email attacks that exploit human error.

A large part of email security has always involved pattern recognition to detect and block anomalies, and AI takes this principle — usually applied to data signals like IP addresses and domains — and expands it to the body of emails. Apply an adaptive learning engine to an organization’s entire email system, and it can be trained to recognize normal communication, right down to language and syntax, allowing immediate alerts to any emails that don’t align with established patterns.

Of course, it’s not just email security systems that have access to AI, and now that the technology’s genie is out of the bottle, cybercriminals are deploying it as well. AI-generated phishing kits enable rapid, automated, multi-prompt engagements that can closely mimic normal communications, and can even be trained to become more effective over time, while AI-assisted coding makes it easier to develop ransomware tailored to exploit specific systems.

The best defense against AI will be more AI, which sets the scene for the next decade of cybersecurity innovation and where healthcare companies should be investing their resources. Staying ahead in this arms race will be vital to resisting the rising tide of email-based cyber-attacks, and email security systems without AI capabilities are already hurtling towards obsolescence against cybercriminals that are more sophisticated and more incentivised than ever before.

The post Digital diagnosis: Why are email security breaches escalating in healthcare? appeared first on Cybersecurity Insiders.

[By John Anderson, Enterprise Information Security Manager, Lands’End]

Securing electronic messaging services, particularly when utilizing third-party services, is crucial for maintaining the integrity and security of your communications. Limiting who can send on your behalf is crucial to maintaining email reputation, security, and governance, ensuring that your communications are trusted by others while preventing unauthorized senders from spoofing your identity and ruining your reputation.

Industry recommendations are to limit outbound messages from your official sending domain to a single relay point. This can be provided by a specially configured secured email relay solution or a third-party messaging security solution, such as Microsoft, Mimecast, Proofpoint et al. It is essential that all third-party messaging partners relay messages through your configured secured email relay to present a single point of reference that can now have DKIM, SPF, DMARC, and other messaging standards (BIMI) applied uniformly. This will improve your overall reputation in the public messaging industry and allow you to track and remediate any potential issues.

There are multiple security, process, and business integrity reasons why you should not add Third Party Partners to your SPF records. These include but are not limited to the following:

  • Managing multiple partners within your SPF records requires constant attention and risks missing removals or changes in the business direction.
  • SPF record may become too large and cause lookup failures with impact delivery rates.
  • Third-Party partners can inadvertently send messages out with your domain signature that are not authorized or related to your business.
  • You are unable to verify what messages were sent by the third party and to whom. This may lead to a Bad Reputation score as a spammer sending unsolicited messages.
  • Third-Party partners may suffer a breach, and this now becomes your breach.
  • You may lose customers’ confidence and have reduced opening rates for your messages.

Here are some best practices to ensure correct DKIM, SPF, DMARC, and overall security standards:

  • “Choose a Reputable Proxy Service Provider”: Ensure that the third-party proxy service provider you choose has a good reputation for security and reliability. Look for providers with a history of maintaining high standards of security compliance.
  • “Implement DKIM, SPF, and DMARC”: These are essential email authentication protocols for preventing email spoofing and phishing attacks.
    • “DKIM (DomainKeys Identified Mail)”: Sign outgoing messages with digital signatures to verify the sender’s domain.
    • “SPF (Sender Policy Framework)”: Define which IP addresses are allowed to send emails on behalf of your domain.
    • “DMARC (Domain-based Message Authentication, Reporting, and Conformance)”: Specifies how your domain’s emails should be handled if they fail authentication checks.
    • “BIMI (Brand Indicators for Message Identification)”: BIMI adds a verified sender logo that appears next to your message in the inbox.
  • “Configure DNS Records”: Ensure that your DNS records are correctly configured to support DKIM, SPF, and DMARC. The DNS records should include the necessary public keys, SPF records, and DMARC policies.
  • “Monitor Email Traffic”: Regularly monitor your email traffic to detect any anomalies or suspicious activities. This includes monitoring for failed authentication attempts, unusual message volumes, and unexpected changes in email patterns.
  • “Enforce TLS Encryption”: Require Transport Layer Security (TLS) encryption for all incoming and outgoing emails. This ensures that emails are transmitted securely over the internet and are protected from eavesdropping and interception.
  • “Implement Multi-factor Authentication (MFA)”: Require users to authenticate using multiple factors such as passwords, biometrics, or security tokens. This adds an extra layer of security to prevent unauthorized access to email accounts.
  • “Regular Security Audits and Penetration Testing”: Conduct regular security audits and penetration testing to identify and address any vulnerabilities in your email infrastructure. This helps ensure that your systems are up to date with the latest security patches and configurations.
  • “Employee Training and Awareness”: Educate employees about email security best practices, including how to recognize phishing attempts and other email-based threats. Regular training sessions and awareness programs can help prevent security incidents caused by human error.
  • “Review Proxy Service Agreements”: Thoroughly review the service agreements with your proxy service provider to ensure that they comply with your organization’s security requirements and standards. Pay attention to clauses related to data privacy, security, and compliance.
  • “Stay Informed About Emerging Threats”: Keep up to date with the latest developments in email security threats and best practices. Subscribe to security newsletters, participate in industry forums, and collaborate with other organizations to share information about emerging threats and vulnerabilities.

By following these best practices, you can enhance the security of your electronic messaging services when using third-party proxy services and ensure compliance with DKIM, SPF, DMARC, BIMI, and other security standards.

The post Recommended Practices for Enterprise Electronic Messaging Security and Governance appeared first on Cybersecurity Insiders.

“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In 2022 alone, cybercrime cost businesses more than €9.6 Billion, with business email compromise taking the lion’s share of the damage. Don’t become an example!

As a result, we’ll delve deep into the most recent developments in email security. We’ll look at the most recent technologies and approaches for keeping emails secure. Additionally, we will discuss some recommended strategies that you can implement to ensure the highest level of security for your email. The proliferation of remote work has elevated the significance of email security to an unprecedented degree. It is critical to investigate every potential security measure that can safeguard our data and maintain the integrity of virtual environments.

Let’s take action and safeguard your business from cybercriminals today!

Why Email Security Matters?

“Your email is under attack, and here’s why.” In our digital world, email is a primary communication tool, but it’s also the number-one threat vector for cyber attacks. Criminals are constantly finding new ways to exploit email vulnerabilities. According to Verizon, 94% of malware is delivered via email. An additional 96% of spoofing attacks begin with an email, according to a Cisco report. However, email security involves more than just technology. In addition, training and awareness are crucial. According to a report by Terranova, 67.5% of individuals who click on a fraudulent link are likely to divulge their credentials. We shall examine the essential measures that must be implemented in order to safeguard one’s email, organization, and self against these perils.

Thus, it is essential to emphasize the significance of having a comprehensive and effective email security strategy. It is essential to maintain business operations and safeguard against potential hazards.

What Are The Types of Email Security Tools?
There’s a vast array of email security tools out there, each designed to tackle the multitude of threats that lurk in your inbox. Let’s break down the most essential features:

  • Spam Filter: No one likes spam, right? A spam filter works tirelessly to keep those pesky, often dangerous, unwanted emails out of your inbox.
  • Anti-Phishing: Anti-phishing tools work like your personal detective. Sniffing out the subtle signs of phishing scams to keep your inbox clean and safe.
  • Data Encryption: Encryption is the superhero of email security. Protecting your sensitive information from prying eyes as it travels across the web.
  • Antivirus Protection: Think of antivirus as your inbox’s bouncer. This helps to stop malware-laden phishing emails from ever stepping foot inside.
  • Content and Image Control: It ensures that everything in your corporate emails is appropriate and followed by company policy.
  • URL Rewriting/Click-Time Protection: These clever tools are like your personal guide in a minefield, ensuring you don’t step on any malicious links.
  • Data Loss Prevention (DLP): DLP acts as your own personal security guard, preventing sensitive data from being shared with the wrong people.
  • Content Disarm & Reconstruction (CDR): CDR is like a meticulous editor, removing any malicious bits from documents before they reach your inbox.
  • Clawback: Your safest bet on slip-through threats. Clawback is your safety net, pulling back harmful emails even after they’ve landed in your inbox.
  • Image Analysis: Image analysis acts as your decoder ring for some code can be hidden in images. It helps reveal and block any hidden threats.
  • Archiving: Archiving is your library of past emails, making sure you’re in compliance with any relevant regulations.
  • Sandboxing: Allowing you to see if anything harmful is cooking up, all without any risk to your main course – your organization.
  • Artificial Intelligence (AI)/Machine Learning (ML): Think of AI and ML as inbox’s smart assistants, using patterns and trends to block any malicious content that tries to sneak past your defenses.

Benefits of Email Security:

Securing your emails is essential for safeguarding important information and preventing damaging data breaches. Email security offers several key advantages:

  1. Protection from phishing and spoofing: These measures can detect and mitigate threats such as phishing or spoofing attacks. These attacks could result in severe breaches and potential malware or virus infections.
  2. Prevention of data breaches: By encrypting emails, you can avoid accidental exposure and help prevent costly data breaches. This ensures that confidential details like credit card numbers, bank accounts, and personal information remain secure.
  3. Enhanced confidentiality: Email encryption ensures that only the designated recipients can access the content of your emails. This enhances confidentiality.
  4. Detection of malicious and spam emails: Email security can identify harmful or spam emails that might bypass your mail system’s spam filter. This protects your accounts from potential threats.
  5. Compliance with regulations: Encryption services can assist businesses in meeting industry-specific regulations. They also help in avoiding potential risks.
  6. Safeguarding sensitive data: Email security protects vital information such as intellectual property, financial records, and top-secret company data. This keeps the data safe from hackers and cybercriminals.
  7. Real-time protection: With anti-malware and anti-spam features, email security solutions provide real-time protection. They shield you against emerging threats.
  8. Prevention of compromised accounts and identity theft: Email encryption can help prevent attackers from stealing login credentials, and personal data. It also stops them from installing malware on your system.

What are Email Security Policies?

Email security policies are a set of rules created to safeguard your messages from the prying eyes of cybercriminals. They act as a protective shield, ensuring that all confidential messages within your organization’s network remain confidential.

Why are Email Security Policies Important?

Tailoring your email security policies is crucial for protecting sensitive data. And ensuring it’s available to users, affiliates, and business partners when needed. Especially important for organizations that follow regulations like GDPR, HIPAA, or SOX, or adhere to security standards like PCI-DSS.

Key Components of Email Security Policies:

  • Strong Password Requirements: Your first line of defense is a solid password. Make sure it’s complex, unique, and changed.
  • Multifactor Authentication (MFA): MFA adds an extra layer of armor to your accounts, requiring many forms of identification to gain access.
  • Email Encryption: This handy tool minimizes the risks of data loss and policy violations, all while keeping the business communication flowing.
  • Email Attachments: Be selective about the file types you allow as attachments and use scanning tools to fend off any malware.
  • Security Awareness Training: Train your team to be email detectives! They should only interact with links and attachments from trusted sources.
  • Regular Software Updates: Stay ahead of the game by regularly updating your email security software.
  • Data Retention: Set clear guidelines on how long emails should be stored and when it’s time to hit the delete button.
  • Secure Email Gateway (SEG): An SEG acts as the gatekeeper of your email stream, blocking any unwanted messages while making sure sensitive data stays put.

Conclusion

As remote work becomes more prevalent, email security has become more important than ever before. By implementing two-factor authentication, you enhance your email security. Using email encryption protects your communications from being intercepted. Undergoing security awareness training prepares you to recognize and avoid cyber threats. Regular software updates are crucial in maintaining security. A secure Wi-Fi network helps protect your online activities from prying eyes. Strong, unique passwords are essential to safeguarding your accounts and digital communications.

Remember, the best defense against email security threats is a proactive approach. Educate yourself, be skeptical of unsolicited emails, and always be wary of email links and attachments. By taking these steps, you can enjoy the benefits of remote work. At the same time, you will keep your digital communications secure and protected.

 

The post Email Security in the Remote Work Era appeared first on Cybersecurity Insiders.

In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones.

Consider this scenario: a malicious hacker gains access to email credentials through phishing techniques and subsequently takes control of the victim’s email account. This precarious situation opens the door to a range of potential threats. The hacker can manipulate the email account to divert important messages to their own malicious accounts or configure settings to automatically delete critical emails or direct them to the spam folder.

For instance, picture a hacker seizing control of a corporate email account and tailoring the inbox to flag keywords associated with financial transactions and confidential information, diverting these crucial communications to unauthorized email addresses. Alternatively, the hacker might exploit the compromised account to impersonate the account holder and send deceptive messages to colleagues, urging them to divulge the company’s administrative credentials.

Cybersecurity firm Barracuda has issued a stark warning, emphasizing the urgent need for corporate entities to fortify their email networks against increasingly sophisticated cyberattacks. Once an attacker gains control of an email account, the abuse of its inbox capabilities commences. The implementation of Artificial Intelligence (AI) technology has further exacerbated the situation, enabling attackers to swiftly identify and target sensitive emails with relative ease.

In a recent incident in the United Kingdom, a cybercriminal demonstrated a high degree of cunning by executing these activities discreetly, evading detection by in-house anti-malware solutions. This threat is not exclusive to the UK and may also be lurking within the email networks of American corporations.

To combat such threats, it is imperative to employ robust security measures such as multi-factor authentication to safeguard email accounts. Additionally, vigilance in monitoring sent and draft folders can help detect unauthorized access and potential threats, mitigating the risk to a significant extent.

It is essential to note that many cyber insurance policies in the United Kingdom do not cover losses resulting from malware spread through corporate emails. This highlights the importance of companies proactively defending their networks against threats to avoid costly consequences.

The post Email inboxes are vulnerable to sophistication driven cyber attacks appeared first on Cybersecurity Insiders.

China has reportedly focused its efforts on compromising email servers within several American government networks, raising concerns about potential data exploitation. According to findings from Mandiant, a state-sponsored criminal group targeted the Barracuda Email Security Gateway (ESG) between October and December 2022, deploying two variations of malware.

The ramifications of these cyberattacks involving the Barracuda email system are presently under investigation, with their full extent yet to be unveiled. However, suspicions point to UNC4841, an intelligence group believed to be backed by Beijing, as the orchestrator of the incident. This group is thought to have introduced the SeaSpy and Saltwater malware into approximately 5% of all Barracuda appliances.

The primary objective of the attack seems to be the extraction of sensitive information from high-ranking government officials in North America. In response, Barracuda has released an update addressing the Zero-Day vulnerability in ESG appliances. Those who have fallen victim to the attack or suspect a potential data breach are strongly advised to promptly replace their appliances. Additionally, affected parties are recommended to rotate their enterprise Active Directory (AD) credentials in order to bolster network defenses against potential future incursions.

In a parallel investigation, the Cybersecurity and Infrastructure Security Agency (CISA) disclosed that the same Chinese group was responsible for unleashing the Submarine and Whirlpool malware across a number of high-value targets.

Austin Larsen, Senior Incident Response Consultant at Mandiant, noted that “espionage actors with affiliations to China have refined their toolsets to an extent where they have become more impactful, elusive, and efficient.”

The post Barracuda Email Hack leaks government emails in America appeared first on Cybersecurity Insiders.