sb-as logo
Story image

Built-in email security measures inadequate - Trend Micro

05 Mar 2019

Cybersecurity solutions provider Trend Micro has announced that its Cloud App Security tool blocked nearly nine million high-risk email threats in 2018 as attackers continued to evolve their tactics.

The findings from Trend Micro’s Cloud App Security report detail how escalating email threat levels are exposing organisations to an increased risk of fraud, spying, information theft, and spoofing.

As email remains a staple communication and collaboration tool globally, it is convenient for cybercriminals to leverage this integral, trusted platform for compromising attacks.

“Organisations are increasingly looking to cloud email services to boost productivity and agility, but the Cloud App Security report reveals that—from credential phishing to business email compromise (BEC) and the use of unusual file types—hackers are employing a variety of new tactics to evade built-in controls, making it critical to invest in a second layer of defence,” says Trend Micro A/NZ technical director Mick McCluney.

As the report reveals, email remains one of the most popular threat vectors.

In total, the solution detected and blocked nearly 9 million high-risk email threats in 2018.

This number was even after Cloud App Security was used as a second filter for emails that passed through Office 365.

A Trend Micro customers’ detection result is available in the report.

This underscores that sophisticated, multi-layered security is imperative for cloud-based email security as part of the shared responsibility model.

McCluney says, “While Microsoft’s internal controls are a great starting point, organisations must take shared responsibility for security in the cloud. Think of third-party email protection as the tyres of your favourite car — an essential add-on.”  

To improve the tool’s detection rates even further, Trend Micro has added new capabilities that combine Computer Vision and Artificial Intelligence technology to “see” fake websites.

This additional technique is applied to suspected phishing emails after filtering based on sender, content, and URL reputation.

The new capabilities sit alongside other Trend Micro email security features.

These strategic offerings include AI-powered Writing Style DNA to combat BEC attacks, machine learning-based detection of suspicious email content, sandbox malware analysis, document exploit detection, and file, email, and web reputation technologies.

Cloud App Security also leverages the Trend MicroSmart Protection Network, which blocked more than 41 billion email threats in 2018.

Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Majority of industrial enterprises face increase cyber threats since COVID-19
Leadership's top cyber security priority was implementing new technology solutions since the onset of the pandemic.More
Story image
The rising threat of human-controlled ransomware
Until recently, most ransomware attacks have been automated affairs. But things are changing, writes Attivo Networks regional director for A/NZ Jim Cook.More
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More