Story image

Report reveals 80% increase in email impersonation attacks

30 Aug 18

Email and data security company Mimecast has announced the availability of its latest quarterly Email Security Risk Assessment (ESRA), an aggregated report of tests that measure the efficacy of widely used email security systems.

A Mimecast ESRA helps participating organisations better understand the number and type of email-borne threats that are getting through their current defences.

As part of the cumulative assessments, Mimecast has inspected more than 142 million emails that have passed through organisations’ incumbent email security vendors.

Latest results revealed 203,000 malicious links within 10,072,682 emails were deemed safe by other security systems – a ratio of one unstopped malicious link for every 50 emails inspected.

The report also found an 80% increase of impersonation attacks in comparison to last quarters’ report with 41,605 caught.

Additionally, 19,086,877 pieces of spam, 13,176 emails containing dangerous file types, and 15,656 malware attachments were all missed by these incumbent providers and delivered to users’ inboxes.

“Targeted malware, heavily socially-engineered impersonation attacks, and phishing threats are still reaching employee inboxes. This leaves organisations at risk of a data breach and financial loss,” says Mimecast cybersecurity strategist Matthew Gardiner.

“Our latest quarterly analysis saw a continued attacker focus on impersonation attacks quarter-on-quarter. These are difficult attacks to identify without specialised security capabilities, and this testing shows that commonly used systems aren’t doing a good job catching them.”

The report indicates the need for organisations to enhance their cyber resilience strategies for email with a multi-layered approach that includes a third-party service provider.

This new ESRA report follows an SE Labs Independent Email Security Services Protection group test, which gave Mimecast the top “AAA” rating.

Other email security services SE Labs evaluated were from Microsoft, Forcepoint, Symantec and Proofpoint.

“The SE Labs report highlights the need for multiple layers of protection to increase security efficacy and to address the rise of more advanced email attacks,” says Gardiner.

Mimecast is engineered to use multiple layers and types of detection engines, combined with analytics and a diverse set of threat intelligence sources, overseen by the Mimecast security operations centre.

This helps protect email data and employees from malware, spam, phishing, and targeted attacks.

Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.
ForeScout acquires OT security company SecurityMatters for US$113mil
Recent cyberattacks, such as WannaCry, NotPetya and Triton, demonstrated how vulnerable OT networks can result in significant business disruption and financial loss.
Exclusive: Fileless malware driving uptake of behavioural analytics
Fileless malware often finds its way into organisations via web browsers (or in combination with other vectors such as infected USB drives).