INFOGRAPHIC
threats are getting through their current
security system.
Every quarter Mimecast aggregates
the results of individual ESRA tests and
reports to the industry. To date Mimecast
has inspected more than 180 million
emails that were deemed ‘safe’ from
these incumbent systems. Within these
emails, the tests found 16,581 emails that
contained dangerous file types.
or file signature matches. This quarter we saw
a particularly large jump in emails containing
dangerous file types.
“Mimecast uses multiple layers and types
of detection engines, combined with high
performance analytics, a diverse set of
threat intelligence sources, and computer
aided human analysis to identify and
stop unsafe emails from getting into our
customers’ inboxes.” n
“
ATTACKS WE ARE
SEEING INCLUDE
KEY EXECUTIVES
BEING TARGETED.
The report also found 21,183,014 spam
emails, 17,403 malware attachments, 42,350
impersonation attacks and 205,363 malicious
URLs, all missed by these incumbent providers
and delivered to users’ inboxes. This latest
report concludes that an aggregate 12% of
all secured and filtered email were unwanted
emails and thus were false negatives.
“Mimecast has seen an increase in security
efficacy versus legacy vendors along with
detailed information on the proliferation
of threats of all types. The ESRA provides
deep insights for our customers on
the types of attacks threatening their
business,” said Lindsay Jack, Security
Service Director at Mimecast.
“Attacks we are seeing include key executives
being targeted with cloud storage services
exploits, impersonation attacks targeting
legal, finance and administrative assistance
as well as social engineering attacks against
the c-suite.
“Mimecast helps organisations understand
how they compare with other organisations
in their geography or industry vertical.
Additionally, these reports provide insights
on the rise of new types of malware and key
trends in malicious email campaigns.”
Matthew Gardiner, Cybersecurity Strategist at
Mimecast, said: “Cybercriminals are constantly
adapting their email-based attacks, looking
for new ways to bypass security solutions that
rely too heavily on reputation-based detection
www.intelligentcio.com
INTELLIGENTCIO
21