wonderfully unique software solutions

Employees often unware of compliance and email security needs, says GFI Software

People at work often know little about their organisation’s requirements around email cybersecurity, data management and regulatory compliance, GFI Software has warned in a customer webinar.

Sindy Rodas, pre-sales engineer at GFI Software, said that sensitive information is often communicated via email, unintentionally placing organisations at risk of large fines and audit failures.

“Often, people in an organisation are not aware of compliance and email security best practices. This puts sensitive information at risk of a data breach,” she said. “That’s why malicious actors through the email have direct access to the weakest link in the chain.”

Rodas said that email security and management offerings including GFI Archiver work “seamlessly” alongside Microsoft Exchange, Microsoft365 (formerly Office 365), Google Apps and other email servers to protect emails, calendars, faxes and files.

Archiver can also help with audits and fend off threats from information breaches to productivity challenges with its MailInsights reporting functionality. Only one copy of an email is sent to multiple recipients and attachments are compressed, to save on storage.

Not being able to receive or send emails for one day or maybe just a few hours can directly translate to money losses for some businesses, she pointed out.

“If anyone wants a user – let’s say a company employee – to receive information, whether it is important, whether it is spam, or whether it is something else that might put our network and our business operations in danger, then they know that they can send that information through an email,” Rodas added.

Threats presented via email range from spam, at minimum causing a loss of productivity just because so many spammy emails are sent and received or at worse containing malicious information or links that threaten the network or business, to attacks on the mail server itself, she noted.

Credential theft alone can affect data confidentiality and integrity, and malware can take down network security, data availability, or the business itself. Ransomware can be considered in that category, she said.

“This is going to cause your systems also to be unusable or unusable. And this will affect your data availability overall,” Rodas said. “Last but not least, we have data leakage, which basically refers to someone from the inside of an organisation sending important or confidential information outside of the organisation, which of course should not be happening.”

Organisations need anti-spam filters that include features like rating and greylisting and can learn. Public and private block lists can make sure organisations only receive information from certain senders. Sender policy framework caller ID, custom spam rules and SMTP greeting delays can also be useful.

Firewalling should preferably include reverse-proxy and distributed denial-of-service (DDoS) protection. Mail servers should use close relay and secure authentication, with backscatter attack protection “also a plus”.

In addition to antivirus, full and regular backup, account compromise protection and enforced secure authentication, look for offerings that deliver content awareness, rather than just categorising emails per user. Dedicated email security software will also offer a “proper module” for anti-phishing that can detect executables and Trojans as well, she said.

“You cannot expect everyone in an organisation to be a cybersecurity expert,” said Rodas. “These challenges can affect any business.”

Click here to view the full GFI Software webinar.

( Image by Muhammad Ribkhan from Pixabay  )

Recent Articles

RealVNC remote-access highlighted by six finalists for Raspberry Pi prize

RealVNC, maker of RealVNC Connect, has named six finalists for this year's RealVNC Raspberry Pi Prize with winner and runners-up to be...

Cyberattack climate entails customised firewalling, notes Stormshield

Firewalling at the edge is no longer enough so organisations increasingly need to combine suitable location with segmentation and zero-trust strategies that...

Palm vein biometrics market set to explode this decade

The market for palm-vein based biometrics has been forecast to expand in line with a compounded annual growth rate of 22.4% from...

Automox targets unsigned scripts with PowerShell signing capability

Endpoint management company Automox is unveiling Worklets Signing, which complements Worklets and Ask Otto with a view to helping companies dodge the...

Arista warns SMBs to take precautions against edge threats

Arista Networks, the vendor of Arista Edge Threat Management (ETM) has warned that SMBs aren't always aware of the extent of targeting...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox