Monday 11 February 2019


Email Security: Issues and Awareness
In an organization each and every individual should aware of email security issues to be taken care of by one and individual. There are various challenges which are to be overcome to get rid of them. Few issues and challenges one should be area of are:
1)      User Behavior: The end users are at the top pf email security issues list because the decisions they take can either prevent bad situations or creates the worst situation. It’s a major issue in an organization as the perception of end user and IT security experts appears to be at odds many times. When the security experts see sharks in the form of threats swimming around, end users simply perceive it in the form of spam. Few organizations do Ethical phishing attacks and social engineering penetration testing on their employees to assess their security awareness. The results reveal that even being aware of attacks, they click on phishing emails.
2)      Targeted Phishing attacks can make a comeback:Earlier Work-intensive manual attacks were common. Now hackers perform targeted phishing attacks or automated attacks which need much more efforts and are a much bigger payoff. Hackers use public social media resources to target a person or a company and learn their particulars like who’s who in the company. Once they get the knowledge, it becomes easy to masquerade as the boss and fire whaling attacks. It is very easy for them to include company logo and other company’s information to make a malicious email more realistic and credible. In one case Hacker has impersonate the cellphone number of a boss and triggered an attack by sending a text message to an employee that referenced as email message.
3)      A Gateway to takeover Account to exploit more: Hackers penetrates less secure computers like laptops used in public Wi-Fi and are then able to weaponize them against the organization. Hackers take overs the Account of an organization which is an indirect challenge to email security. Once a computer of an organization or of an individual is compromised, hackers use Mimikatz, an open source tool and Microsoft’s built-in Remote Desktop Protocol to dump all credentials of a machine. Once the account get takeover by Hackers, they can use powerful tools like Power shell, Windows Management Console to reach out to machines exists on the corporate network. They can easily uses services to exploit vulnerabilities on networked computers.
4)      IoT and Mobile Device Security Challenges: IoT and handheld devices can also be compromised and can become a part of phishing and other security attacks. Hackers can use a targeted phishing attempt or can take over account easily via a clean application of an iPhone or android Phone. This application might contains a code that takes users to a phishing site that requests its credentials Even IoT devices like surveillance cameras , Wi-Fi routers based an open source code are open and viable to exploitation. Usually IoT devices are small networked computers which all can be used as jumping off points for security incursions.
5)      Think Beyond Perimeter Security: All the organizations implements highly effective security perimeters like firewalls, Web Application Firewalls, intrusion Detection/prevention systems and email security gateways. That is why Hackers hack machines and compromise emails and users that might be outside the perimeter. They use plain and harmless email to trap inside users outside the perimeter. Perimeter security plays an essential role but at the same time one has to be careful about other potential attack surfaces.
Summary: It is very much required to be vigilant as vigilance is the key in order to address email security issues. It has been observed that the nature of attacks transforms boundlessly. There is no standard way, how the hackers can attack for better or worse and it’s very difficult for security vendors to have a standard method to identify and stop these changing attacks.
Ms. Arpana Chaturvedi
Assistant Professor
Information Technology

No comments:

Post a Comment