Intelligent SME.tech Issue 19 - Page 21

intelligent

// EDITOR ’ S QUESTION ?

SAMEER BASHA , SECURITY CONSULTANT GCC AT CHECK POINT SOFTWARE TECHNOLOGIES

E mail is one of the most widely used mediums for business communications , and also the most preferred vector for cyberattacks . Over 90 % of attacks on organisations start from malicious emails . Every organisation is a potential target for email delivered attacks such as phishing , Business Executive Compromise , malware , account take over and loss of confidential data , hence every organisation should have the right security controls to minimise risks associated with these attacks .

An effective email security strategy is twopronged . Proactively create user awareness to recognise and appropriately report email-based attacks and secure the email system with an efficient email security solution that prevents email-based attacks . Check Point Harmony email and collaboration is a leading Machine Learning ( ML ) -based email security solution designed to prevent email-based attacks .
These email security best practices outline important steps that an organisation should take to secure corporate email communications .

1

Continuous cybersecurity awareness training – Human is always the weakest link . No technology provides 100 % protection . User awareness and the resulting user feedback will complement and strengthen the organisation ’ s email security objectives and fine tune email attack detection .

2

Implement strong user authentication – A user ’ s email account contains a vast amount of sensitive information . Even if sensitive data like payroll or research and development data isn ’ t contained within emails – or stored in cloud-based accounts linked to these email addresses – the information about internal relationships that email contains can be invaluable for a social engineer planning a spear-phishing campaign .

3

ML-based email security solutions with DLP – Modern day email attacks have become very sophisticated and go undetected with traditional signature based solutions . Machine Learning-based email security solution with data leakage protections is the right recipe for the current threat landscape .

4

Implement robust endpoint security – Security should be enforced based on a strategy of defence in depth . In addition to email security solutions , an organisation should have an integrated endpoint security solution as the last line of defence . Endpoint security can help to detect and remediate malware infections that escaped other security defences .

USER AWARENESS AND THE RESULTING USER FEEDBACK WILL COMPLEMENT AND STRENGTHEN THE ORGANISATION ’ S EMAIL SECURITY OBJECTIVES .
Intelligent SME . tech
. tech
21