Navigating the digital waters without getting caught by whaling and phishing attacks As we dive into October, cybersecurity awareness month, there are lots of strategies to help us all become stronger swimmers in the digital waters. Given that there are 112 billion business emails sent around the world every day, that is one huge ocean that everyone can learn how to better navigate.Since its inception, email has become mission critical, and so many necessities beyond mail service have grown up along with it. Enterprises have become burdened by the complexities of email, which additionally requires the added protections of encryption gateways, spam filters, phishing protections, and much more.In order to attack all of the issues of email security in the age of digital disruption, you first have to know what is beneath the rough seas.Peter Bauer, CEO of Mimecast, said beyond the nuisance of spam, virus, and email DDoS, there are threats that have become much more targeted. “First, there are URL links in emails that are typically taking a recipient to a website where they are going to try to steal their credentials with a phishing attack or malware to download,” Bauer said. Those who aren’t proficient swimmers can avoid this threat by not taking the bait. Don’t click. It’s become common knowledge in many enterprises that users shouldn’t click on a link before verifying its authenticity.Unfortunately, business emails are intended to do business. Sometimes that demands that sender and recipient exchange information either by clicking on links or opening attachments. Those attachments, Bauer said, are another targeted threat. “Weaponized attachments are very frequently ransomware. There are other malware vectors coming through as well that may be looking to do data exfiltration or to recruit botnets.”When it comes to the targeted threat of impersonation attacks, perhaps all the fish in the sea would be safer if they suffered from memory loss and repeatedly asked, Do I know you? like the beloved little Dory.Bauer said, “There is no malicious payload in the email. It’s become so easy to impersonate other people within the company through whaling, which is designed to steal data.” As far as emails are concerned, maybe all users should assume everyone is a stranger. That way, the attackers have a lesser chance of finding the treasures at the bottom of the sea.“They are looking for credentials, consumer credentials, or user credentials. Others are after ransoms, maybe bitcoin but sometimes cash as well in exchange for returned access to data,” said Bauer.The data holds the most value whether its personal information which they can sell or use for other financial gain. “Data is stolen for espionage purposes and intellectual property theft or to gain a lot of insight so that they can plan a more sophisticated attack,” said Bauer.Still others are after computing resource, said Bauer, and they are recruiting for botnet armies, for spam, and for launching DDoS attacks. The best ways to stay safe in the email seas are either to teach your fish how to swim or get everyone aboard that old yellow submarine. On the technology side, Bauer said, “There are a lot of email security technologies that are largely capable of addressing the spam problem but not the more targeted attacks.”When it comes to email security solutions, there are methods that will detect the malicious URLs and prevent weaponized attachments from ever getting to the end user. ”For the majority of files that come in from the outside world,” said Bauer, “the recipient doesn’t intend to do anything with them in terms of editing.”Human resources departments are receiving resumes, they don’t need to edit those. One solution is that those recipients get read only files. “If they need the original, they can click a link to request the original,” said Bauer.Yes, frolicking in the water looks fun, but it’s also dangerous. Novice or inexperience swimmers who are tossed into the middle of the ocean will likely drown, which is why awareness and user training is so critical. “We try to help people be less trusting of things that may not be as they appear,” said Bauer. “The barriers of entry to launch an impersonation attack are so low and so effective that attackers are going after all sized companies,” Bauer said. They aren’t only targeting enterprises where the reward is $100,000. “They are able to get $5k for an impersonation attack, and that’s not bad for a morning’s work,” Bauer said.That’s why it’s your job to throw the end users a buoy so that they can at least float while they try to become stronger swimmers in the email seas. Check out the weekly themes for National Cyber Security Awareness Month and remind everyone of the important of cybersecurity awareness. Related content news analysis Searching for unicorns: Managing expectations to find cybersecurity talent Finding the cybersecurity leaders of tomorrow means being realistic about job descriptions and providing training and mentoring for non-traditional tech people. By Kacy Zurkus Sep 29, 2017 4 mins IT Skills Careers IT Leadership feature Vulnerability vs. risk: Knowing the difference improves security Conflating security terms evokes fear but doesn't help security newbs understand the difference between vulnerabilities and actual risks. By Kacy Zurkus Sep 26, 2017 3 mins Risk Management Vulnerabilities IT Leadership opinion What the Equifax breach means to me — an end user perspective Recovery and resiliency or apathy. Which will prevail now that most everyone's PII has been exposed in another massive breach? By Kacy Zurkus Sep 15, 2017 4 mins Cyberattacks DLP Software Internet Security opinion Abandoned mobile apps, domain names raise information security risks When app creators abandon domains for bigger, better deals, what happens to all the app-specific data? By Kacy Zurkus Sep 08, 2017 3 mins Access Control Data and Information Security Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe