Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity

    The Growing E-Mail Security Challenge

    Written by

    Brian Prince
    Published April 18, 2008
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Scott Larsen has taken great pains to be able to sleep at night, confident that the e-mail systems at his workplace are being maintained and that the wall separating those systems from spam and phishing attacks still stands.

      But, as at many organizations, the wall guarding the e-mail systems at Larsen’s company-travel agency Groople-is constantly under siege, with the attacks getting more brutal.

      Click Here to Watch the Latest eWEEK Newsbreak Video.

      “As Groople has grown, I have seen the volume of e-mail-based attacks skyrocket,” said Larsen, the company’s manager of IS. “It soon overburdened our e-mail gateway, and I was forced to implement new systems and software to handle the huge increase.”

      Vendors and enterprises alike are faced with a new e-mail threat landscape, where spam is increasingly laced with malware and targeted attacks have become more common. IT pros have a lot to consider-both in terms of technology and best practices-as they deal with the growing e-mail security challenge.

      How do you take control of e-mail-ruthlessly or humanely? Read more here.

      According to Larsen, Groople grapples with about 1 million e-mails each month, 76 percent of which are either blocked by Trend Micro’s Network Reputation Services or quarantined as spam. About 5 percent of spam messages get through to Groople in-boxes, he said.

      To avoid this messaging traffic overburdening the network, the company went to a load-balanced e-mail gateway environment earlier this year. Larsen said he made sure security was woven into the gateway’s fabric.

      “Our entire e-mail infrastructure is architected in conjunction with our security infrastructure … to maximize the use of multiple layers of protection,” Larsen said. “An attack must make it through several separate layers to get onto a user network. Any company that looks at e-mail as simply a business tool is blind. E-mail is a significant security threat to all businesses and should be addressed aggressively.”

      The New Threat Landscape

      The New Threat Landscape

      According to researchers at Symantec, one in every 617 spam messages now contains malicious code.

      “In the past, a message was either spam or a virus. … A single verdict was usually sufficient to catch it or remedy the situation,” said Angelos Kottas, senior manager of product marketing for Symantec Messaging Security. “But what we’re seeing as a trend is spam that also has malicious code embedded in it, so that a simplistic approach might not catch it.”

      In MessageLabs’ monthly Intelligence Report for March, the company reported that it found one in every 169.2 e-mails containing a virus and one in every 228.7 e-mails containing a phishing attack.

      The report goes on to say that some of these attacks were targeted-aimed at specific people in various organizations.

      “We’ve been seeing a sharp increase in [targeted attacks]. On average, we will intercept about 30 targeted Trojans per day,” said Mark Sunner, chief security analyst at MessageLabs. “In December 2005, that average would have been about two per week.”

      Most companies walk a high-wire e-mail risk without a net. Click here to read more.

      Spam is clearly increasingly being used as an attack mechanism, infecting machines so they can be used in botnets to send more spam, said Gartner analyst Peter Firstbrook. While only one in every 150 to 200 e-mails may contain a virus, a much higher percentage of e-mails include a link to a malware-infected site.

      “Sharing threat intelligence is one reason to have a coordinated SMTP and Web gateway,” Firstbrook said, adding that, for many organizations, the lack of a secure Web gateway capable of filtering malware is a glaring hole in their defenses.

      Many Means to Security End

      Many Means to Security End

      Only a few weeks ago, a targeted e-mail attack reached the in-box of a county employee in Arlington County, Va. David Jordan, the county’s chief information security and privacy officer, recalled that a password dump program had been hidden within an e-mail attachment. However, because the employee had received security awareness training, she did not open it.

      “The employee knew better than to open the attached file,” said Jordan. “She simply forwarded the suspect e-mail to the technology services help desk.”

      The county uses Symantec Client Security, and Jordan said the system likely would have neutralized the malicious program even if the user had opened the attachment. Nonetheless, he cited the incident as an example of the importance of living in a constant state of vigilance from a security and employee education perspective.

      “One of my missions is to make sure employees are educated and to empower them to be responsible and accountable for safe computing practices,” he said. “For instance, I personally meet with every new hire during the training process to ensure individuals are aware of online threats and the county’s security policies, which include Web and e-mail usage. Additionally, we conduct ongoing training and awareness initiatives, such as publishing weekly newsletters and alerting employees to the latest scams and e-mail threats via the county’s SMS [Short Message Service] text alert system.”

      Indeed, no technology can protect an organization if users are not properly educated about the do’s and don’ts of Web security, said Kevin Hewitt, network administrator for Stevens Aviation.

      “Here at Stevens Aviation, we alert all of our users on any new possible threats,” Hewitt said. “We do this to protect our network but also to help our users avoid these issues at home. In the event we send out an e-mail within the company to inform our users of new issues, we also include an FAQ section to review and remind our users of ways to avoid being scammed, infected or exploited.”

      Stevens Aviation opted for a software as a service approach to e-mail security with Webroot’s E-mail Security SAAS. The aviation company receives about 120,000 e-mail messages daily, of which about 93 percent is spam, Hewitt said. The SAAS model, he added, saves bandwidth and allowed the company to eliminate a server that had been acting as the company’s internal spam solution.

      Read tips here on how to ease spam threats.

      Hewitt offered several e-mail security best practices, and he advises businesses to choose enablement over blocking when it comes to Web mail, allowing users to access Web-based accounts instead of their work e-mail for all personal transactions.

      But letting employees access Web mail doesn’t come without risks-and not just in terms of employee productivity.

      In MessageLabs’ Intelligence Report for February 2008, researchers noted that 4.6 percent of all spam originates from Web mail-based services. The researchers also found that the proportion of spam from Gmail increased twofold, from 1.3 percent in January to 2.6 percent in February. Yahoo Mail was the most abused Web mail service, responsible for sending 88.7 percent of all Web mail-based spam.

      “I think some companies would just take the view, -We’re not allowing Web mail because in theory it could be a bullet hole in your security,'” said Sunner, the MessageLabs security analyst. “If you think about it, if you’ve got a mail gateway, you’ve probably got some form of content filtering, some level of anti-virus protection. You’ll be doing something almost certainly these days to protect your corporate e-mail system. So, having done that, if you allow access to Hotmail [for example], of course if someone then receives a virus in their Hotmail account and they go and access it, they completely blind-sided all the mechanisms you did put in place.”

      E-Mail Security or Content Security?

      E-Mail Security or Content Security?

      In an era of data breaches and insider leaks, a conversation about e-mail security is about more than just spam and malware-it is also about DLP (data leak prevention). In fact, the focus of enterprises has shifted more toward overall content security, said John Thielens, vice president of technology at Tumbleweed Communications.

      “To [solve content security problems] today, you need to buy products from six or seven different vendors-a Web filter, an e-mail filter, a content analysis suite, a file transfer product, an endpoint protection suite,” Thielens said.

      DLP products offer a more comprehensive approach, with their content monitoring, data classification and policy enforcement capabilities.

      The DLP market saw a number of acquisitions last year, and the technology is making its way into the enterprise market. However, many companies have been slow to deploy the technology, which helps to prevent the loss of sensitive data by stopping, for example, an e-mail including a Social Security number from crossing the mail gateway.

      Click here for 10 things you should know about spam.

      In the report released last November “Extending Intellectual Property Protection Beyond the Firewall,” analysts from Enterprise Strategy Group found that only 17 percent of the 109 respondents were using network-based DLP appliances at their organizations.

      The ability to block classified data before it leaks out via e-mail can be a key element in e-mail security. But before investing in DLP, companies should first understand what their sensitive data is and what their business needs are, according to analysts. The risk of focusing too much on a block-and-allow approach is that employees-ultimately the last line of defense in security-will simply circumvent whatever protections are put in place, Thielens said.

      “Think of the content management problem as a bubble in a long balloon animal. If you squeeze the controls around that bubble, the air just moves to the left, to the right,” he said. “If you lock down e-mail, people start using files and Web and instant messaging. If you take this blocking mentality, you’re always in catch-up mode.

      “Instead, think about enablement, and tell people, -We’re going to put some defensive controls that block the wrong ways of doing things in place, but we’re also going to give you ways where you know how to do business with your content.'”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.