Intelligent SME.tech Issue 08 | Page 42

intelligent

// FEATURE //

MOST HACKERS DON ’ T
DISCRIMINATE BETWEEN LARGE
AND SMALL BUSINESSES , SO IT ’ S VITAL SMES BOLSTER THEIR CYBERSECURITY ON THIS FRONT .
Sam Curry , Chief Security Officer , Cybereason sender , look for grammatical mistakes and stay vigilant to an unusual sense of urgency or eagerness in the tone of the message .
Of course , cybercriminals are becoming ever more sophisticated in their tactics , so much so that it can be near impossible to distinguish real emails from phishing scams . Therefore , businesses need to implement other measures alongside training . This includes using email filtering software that can help detect and flag suspicious email addresses and malicious links or attachments .
The software should also accommodate for unknown threats by testing unfamiliar URLS and files in a sandbox , or a secure and isolated environment , to prevent the spread of malware . In addition , multi-factor authentication should be applied where possible . That is , requiring users to meet a combination of ‘ something you know ’ ( e . g . password ), ‘ something you have ’ ( e . g . token ) and ‘ something you are ’ ( e . g . biometrics ). That way , if an attacker accesses an employee ’ s credentials , the information is virtually useless . unsure of the source . Instead , they should seek a second opinion .
Individuals can also help avert the spread of large-scale attacks by reporting suspicious communications to the Suspicious Email Reporting Service ( SERS ): report @ phishing . gov . uk which supports the government ’ s Active Cyberdefence programme .
SAM CURRY , Chief Security Officer , Cybereason said :
Email remains one of the most compromised services no matter how much security training we throw at it , but it doesn ’ t have to be that way . Email can be made less vulnerable – the key to the strategy is to know your stack , get the basics right , consider the configuration and security controls to enable , have a detection strategy and lean into the email security solutions , both old and emerging .
Finally , it ’ s important to encourage employees to apply an ‘ if in doubt ’ approach . Staff should never click a link or download a file if they ’ re
The first step is to understand the unique trade-offs in email security based on your platform : Google is not the same as Microsoft ,
42
. tech
Intelligent SME . tech