Email is the weak link

July 2017 Editor's Choice, Information Security, Security Services & Risk Management

Email remains any firm’s most important business tool, and 43-trillion emails are sent annually, with company employees each receiving about 100 daily. Yet it is one of the weakest links in terms of cybersecurity.

“The problem with email is that it was not designed to be secure. It was designed to be easy to use,” says Dr Aleksandar Valjarevic, head of professional services at LAWtrust. “Even as technologies used by businesses change and evolve, such as web-based portals and cloud-based services, email is not going away and it has not changed.”

The weak security that is inherent in email makes it one of the top five business risks that a company could face, because of the type and volume of information exchanged every day.

Cybersecurity dominated the news recently with an unprecedented attack from a ransomware worm.

It is threats such as these that makes email what cybersecurity professionals describe as ‘target rich’. This is similar to language used in warfare and means that an attacker has superior means to attack a high number of attractive and poorly defended targets all at once. To be clear, targets are your sensitive and private data, trade secrets, business plans, and the list goes on.

Recent research by the Radicati Group, a technology market research firm, shows that on average, people receive about 100 emails a day. The risks posed by email are often poorly understood within organisations or poorly managed, with low compliance to what are sometimes good IT policies.

“If you think about the information you receive and share on a moment-to-moment basis with people inside and outside your company – maybe pricing direction on a tender, or even your personal information may be in an email for an insurance claim, you will realise how rich the data is and how attractive it is for cyber criminals,” says Valjarevic.

Not if, when

Once the information in the email is compromised, it can wreak havoc with a business and someone’s personal life. Among South African companies there is a growing understanding that it is no longer a case of if their data will be breached, but when. Passwords, credit card details, sensitive personal and business information are just some of the types of information that are regularly shared by email.

The average cost of a data breach in SA is about R28.6-million, according to the Ponemon Institute. Worldwide, this number is much higher at $4-million. Much of this cost is related to loss of business and the enormous damage that can be done to a company’s reputation once its security has been breached. But email doesn’t even need to be hacked to pose a risk. The other problem with email is the habits of people using email.

In a recent study by cybersecurity firm Stroz Friedberg, titled Information Security Risk in American Business, 58% of senior managers admitted that they had accidentally sent sensitive information to the wrong person. Further, only 17% of recipients indicated they had ‘never’ mistakenly sent information to an external third party, while 83% said they didn’t know or frequently had.

There are many ways to improve the safety of email, but these often fail because they are not convenient, or are too complicated to use or too difficult to manage for IT managers. Nevertheless, businesses are clear that ease of use of email services is very important to keep customers happy and to keep businesses functioning, according to the Ponemon Institute.

Along with the clear dangers that email presents, there is also a growing regulatory burden to protect information. Companies in South Africa and those doing business with the EU have about a year to implement their plans to comply with new regulations related to the protection of personal information.

So what can be done?

“As much as possible, automate email security solutions, ensure they are encrypted, create quarantine protocols that automatically block emails that shouldn’t leave the organisation,” Valjarevic says.

“The introduction of the Protection of Personal Information Act (POPI) this year is going to drive an enormous amount of companies to look for solutions that will help them comply with the new law. Finding the right solution that makes compliance easy to measure and report on, will be the key to success.”

One of the most shocking findings in the Stroz Friedberg study was that 1% of respondents said they never ignored their company’s email policy. “As a business owner, you need to ask yourself if 1% of my employees abide by the IT policy, do I want to leave my POPI compliance to the other 99% of users?” asks Valjarevic.

For more information contact LAWtrust, +27 (0)11 731 8238, [email protected], www.lawholdings.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SAFPS issues SAPS impersonation scam warning
News & Events Security Services & Risk Management
The Southern African Fraud Prevention Service (SAFPS) is warning the public against a scam in which scammers pose as members of the South African Police Service (SAPS) and trick and intimidate individuals into handing over personal and financial information.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...