Phishing, once a key threat in the banking and finance sector, has now become a technique used by hackers targeting every industry sector – none is immune.
The Symantec Internet Security Threat Report always make a great read !.
Phishing, spear phishing, Business Email Compromise (BEC), whaling, CEO Email Abuse and of course SPAM – technically there are differences that would be lost to the average consumer but at the most basic level – these are all examples of fake emails.
So the question is – “what controls can be put in place to tackle the issue of fake emails ?”
Solutions do exist of course, both simple and more advanced. Don’t forget that email has been around for many decades – I remember offering managed email services with 50 MB of storage at the turn of this century – yes megabyte !!
Many organisations deploy solutions without taking the time to analyse the issue and are essentially throwing money away. For example :
- Phishing – targeting consumers with emails that contain URL links to hacked webpages (phishing page) or malicious attachments – ACTION – perform enforcement to remove (takedown) of phishing page.
- Spear Phishing /BEC / other variant – inbound targeting of employees that similarly contain malicious URLs and attachments – ACTION – subscribe to expensive cloud email filtering services that employ extensive Artificial Intelligence / Machine Learning (sic)