Case Study: Why Do Hackers Target Email?

1 year ago

Email became a popular form of communication in the 1990s, it has also become an incredibly essential part of day-to-day business communication. Cyber criminals over the last three decades have exploited the popularity and dependence on email communication by creating socially engineered phishing and malware campaigns. Email remains one of the most common routes for cyber criminals to attack businesses; this is because phishing emails rely on human error. It takes just one employee mistakenly clicking a malicious link within an email to potentially lead to a whole organisation being compromised.ย 

So, if email is so susceptible to phishing, why do we continue to use it? Despite the sophistication of email spam filtering services, email attacks are constantly being reinvented and finding new ways of portraying legitimacy. For example, Barracuda Networks reported that there was a 667% spike in the number of Coronavirus related phishing attacks earlier this year. This is just one-way cyber criminals evolve their campaigns to play on peopleโ€™s fears and can be mistaken for legitimate emails. Today, we take a deeper look at why hackers still target email and what you can do to be vigilant. 

Emails can appear legitimate 

A successful email attack will usually impersonate someone you know, a business, a service, or a government institution. It is incredibly easy to impersonate a person or an entity through email by just including some seemingly legitimate factors such as a domain name and logo. Email spoofing campaigns have been a popular phishing tactic over the last year. An attacker will compromise a personโ€™s email account generally without their knowledge. They can then send messages to colleagues and friends pretending to be that person. Since the receiver assumes said person is a trusted sender, they will not scrutinise this message as closely as other emails.  

Email spoofing was especially prominent during the months where most people worked from home during the Coronavirus lock-downs. You can read more about Account Takeover (ATO) attacks.

Inadequate security 

Investing in Managed Services helps protect your businesses against security threats such as malicious email campaigns. This is achieved through a strategic, sophisticated security suite. This includes things such as top of line spam filtering and Next Gen Anti-Virus. Read more about Sentinel One

Hackers rely on businesses whose email accounts arenโ€™t protected by spam filtering and other security measures. Having inadequate security means your entire organisation could be compromised if someone were to fall victim to a phishing attack. 

Human error 

According to the UK Information Commissionerโ€™s Office, 90% of data breaches occur due to human error. Hackers target email because they rely on recipients not knowing about cyber security or scrutinising the emails they receive.  

Mimecast conducted a phishing attack simulation with a 6,500 person organisation that did not provide cyber security awareness training. The study showed that 500 users clicked the malicious phishing link in under a second. Whilst this is worrying, if employees are given cyber security awareness training, they may be less likely to unwittingly open malicious links or fall victims to other attacks. 

Email still plays an important role in day-to-day business communication. While hackers are constantly evolving their malicious campaigns, there are steps to pro-actively safeguard your business. Investing in Managed IT Services adds an important layer of security to safeguard your business and your team. Another step to better security is recognising that human error is the weakest link in the chain of cyber security. This can be made less severe with regular awareness training and education. 

If you have any security concerns call Milnsbridge today on 1300 300 293

Letโ€™s get started

Get in touch today and speak with one of our friendly staff. We will take the time to assess your business requirements and provide an obligation-free quote.ย 

Facebook
Twitter
LinkedIn

CORE

All the essentials
$ 75 Monthly
  • 3 Hours Remote Support
  • Support Hours 8am - 5.30pm M-F
  • Best Effort Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment

Growth

Unlimited Support + Security
$ 95 Monthly
  • Unlimited Remote + Onsite Support
  • Support Hours 8am - 5.30pm M-F
  • Guaranteed Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment
  • Keeper Password Manager
  • Duo Multi Factor Authentication
  • DNS Filter Internet Protection
Popular

Enhanced

Unlimited Support 24x7 + Security
$ 165 Monthly
  • Unlimited Remote + Onsite Support
  • 24 Hours Support - 7 Days a Week
  • Priority Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment
  • Essential 8 Assess & Report
  • Monthly Vulnerability Scanning
  • Threatlocker Application Control
  • Keeper Password Manager
  • Duo Multi Factor Authentication
  • DNS Filter Internet Protection