Email security is one of the foundational aspects of an organization’s security protocols because of the fact that this is the sort of thing that could potentially end up keeping many threats at bay. In spite of the fact that this is the case, most widespread email security practices appear to be failing to protect organizations that use them, with 89% of them suffering an email breach over the past year.
This data comes out of a survey conducted by Osterman Research, and it was done at the request of Cyren. With all of that having been said and now out of the way, it is important to note that many businesses that use Microsoft 365 participated in this survey so its findings are thought to be fairly accurate. Just under half of organizations said that they felt like their security protocols were effective, and a similar number felt that they were able to successfully ward of potential threats that would target their email servers.
What’s more is that the total quantity of breaches of this variety have more than doubled in less than three years, with current numbers being twice that of those seen in 2019 with all things having been considered and taken into account. A truly concerning fact in this report is that 99% of organizations train their users to spot suspicious emails and flag them, but the vulnerabilities still get exploited despite them investing in frequent training for employees.
That might be because organizations only analyze a quarter of the emails that get flagged, something that indicates that they’re not going too far beyond the standard things that they know to do. Organizations need to be start being more proactive about things like this, because no matter how many suspicious emails their employees point out, these systems won’t have an impact on improving security if organizations don’t play their part by analyzing said emails and looking into how these threats might have worked out. Using nothing but the basic security protocols is why these threats are continuing to be common.
Read next: 41% of Cyber Attacks Are Now Done Through Cloud Servers, New Data Reveals
This data comes out of a survey conducted by Osterman Research, and it was done at the request of Cyren. With all of that having been said and now out of the way, it is important to note that many businesses that use Microsoft 365 participated in this survey so its findings are thought to be fairly accurate. Just under half of organizations said that they felt like their security protocols were effective, and a similar number felt that they were able to successfully ward of potential threats that would target their email servers.
What’s more is that the total quantity of breaches of this variety have more than doubled in less than three years, with current numbers being twice that of those seen in 2019 with all things having been considered and taken into account. A truly concerning fact in this report is that 99% of organizations train their users to spot suspicious emails and flag them, but the vulnerabilities still get exploited despite them investing in frequent training for employees.
That might be because organizations only analyze a quarter of the emails that get flagged, something that indicates that they’re not going too far beyond the standard things that they know to do. Organizations need to be start being more proactive about things like this, because no matter how many suspicious emails their employees point out, these systems won’t have an impact on improving security if organizations don’t play their part by analyzing said emails and looking into how these threats might have worked out. Using nothing but the basic security protocols is why these threats are continuing to be common.
Read next: 41% of Cyber Attacks Are Now Done Through Cloud Servers, New Data Reveals