Home Resources Blog Rise in Email Impersonation Attacks Makes Companies Re-Assess Their Security Efforts

Rise in Email Impersonation Attacks Makes Companies Re-Assess Their Security Efforts

Admin Globaldots
06.08.2018
image 1 Min read

Most companies believe they’ve experienced serious data breaches driven by email impersonation in the past 12 months – but are not doing nearly enough to prevent future impersonation attacks, according to a new study conducted by the Ponemon Institute.

The study found that IT security professionals were most worried about email as the source for impersonation attacks, including phishing and domain spoofing. The study surveyed 650 IT security professionals who have a role in securing email applications and/or protecting end-users from email threats. The average company in the study has more than 1,000 employees, six servers, and 15 cloud-based services that send email on their behalf – indicating they operate with complex email environments.

Key findings

  • 80 percent of respondents are very concerned about the state of their companies’ ability to reduce email-based threats
  • 65 percent are likely to implement an automated DMARC enforcement solution if it stopped impersonation attacks
  • 79 percent believed their organizations had suffered a data breach in the last year
  • 69 percent say their organizations use anti-spam and anti-phishing filters as their primary protections even though those mechanisms have been proven to be ineffective
  • 61 percent felt their companies aren’t spending enough to prevent email-based cyberattacks, in spite of a sense of urgency among IT professionals
  • 59 percent say their organizations have not created a security infrastructure or plan for email security.

Image Source

Read more: Help Net Security

Learn More

Streamline Your Alert Management with Groupings
Monitoring, Logging & Observability
Admin Globaldots 02.02.23

Alerting is crucial for avoiding outages, not just responding to them. That’s why GlobalDots is adopting an innovation that revolutionizes the way alerts are processed, enabling teams to achieve their goals proactively and resolve issues quickly. Handling alerts on a large scale can be difficult, especially when dealing with hundreds or even thousands of alerts. […]

Read more
You’ll Need Zero Trust, But You Won’t Get It with a VPN
SD-WAN and SASE
Admin Globaldots 12.01.23

Properly implemented, a zero trust architecture provides much more granular and effective security than legacy security models. However, this is only true if a zero trust initiative is supported with the right tools. Legacy solutions, such as virtual private networks (VPNs), lack the capabilities necessary to implement a zero trust security strategy. Zero Trust Security is […]

Read more
4 Ways Where Remote Access VPNs Fall Short
SD-WAN and SASE
Admin Globaldots 09.01.23

The Global Content Delivery Network (CDN) market is expected to grow by $42.4 billion between now and 2032.

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo