IT Central Station is now PeerSpot: Here's why

Top 8 Email Security

Proofpoint Email ProtectionCisco Secure EmailMicrosoft Defender for Office 365TitanHQ SpamTitanFortinet FortiMailPerception Point Advanced Email SecurityBarracuda Email Security GatewayIRONSCALES
  1. leader badge
    The most valuable feature of Proofpoint Email Protection is the blocking capabilities, it blocks a lot of potential threats.Its main defense is to stop malicious emails from coming through. There is a sandbox environment where you can open malicious or suspicious emails to make sure that they're not malicious, instead of taking the risk of having your employees do it. This is definitely something that everybody needs nowadays, especially with the rise in cyber attacks.
  2. leader badge
    It has an intuitive, clear graphical interface where you can deploy your policies and understand the overall flow. There are a lot of things that you cannot handle on the graphic interface, like message filters. For this, you need to go to a lower level where you have more power, like command line interface. So, this solution has the best of both worlds. There are not a lot of bells and whistles. It is more practical with access to most features that you can configure.
  3. Buyer's Guide
    Email Security
    July 2022
    Find out what your peers are saying about Proofpoint, Cisco, Microsoft and others in Email Security. Updated: July 2022.
    620,600 professionals have used our research since 2012.
  4. leader badge
    The most valuable feature of Microsoft Defender for Office 365 is the ease of use.Microsoft Defender for Office 365 is a stable solution.
  5. leader badge
    We have had no cases of malware slipping through since we have had SpamTitan.I like the ability to go online and view mail that's been quarantined. SpamTitan lets you look at the mail and decide whether you want to release it or not.
  6. leader badge
    Fortinet FortiMail's most valuable features are its performance and security.It can block a lot of fake emails.
  7. Their security engines are very effective at stopping malware and potential attacks before they reach a user's mailbox. They have the best detection engine.
  8. report
    Use our free recommendation engine to learn which Email Security solutions are best for your needs.
    620,600 professionals have used our research since 2012.
  9. The most important features of Barracuda Email Security Gateway are the simple and quick configuration, interactive console, and easy-to-understand logs.
  10. The biggest benefit is that we get fewer phishing and spam emails, so using IRONSCALES has made our environment much safer. Their anti-phishing platform is absolutely fantastic. The automated AI piece is amazing, and their technical support is fantastic.

Advice From The Community

Read answers to top Email Security questions. 620,600 professionals have gotten help from our community of experts.
Rony_Sklar - PeerSpot reviewer
PeerSpot (formerly IT Central Station)
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
Read More »
SimonClark - PeerSpot reviewer
SimonClark Dan Doggendorf gave sound advice. Whilst some of the free or cheap… more »
12 Answers
Rony_Sklar - PeerSpot reviewer
PeerSpot (formerly IT Central Station)

With remote work having become the norm for many, what security should businesses have in place? Do you have suggestions of specific products that businesses should look at?

Philippe Panardie - PeerSpot reviewer
Philippe PanardieThere is not a single answer. In our company, we use only company devices for… more »
3 Answers

Email Security Articles

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jul 05 2022
Dear PeerSpot community members, This is our latest Community Spotlight for YOU. Here we've summarized and selected the latest posts (professional questions, articles and discussions) contributed by PeerSpot community members.  Check them out! Trending See what your peers are discussing a...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Apr 08 2022
For most companies, whether they are large or small organizations, cyber threats and hacker attacks are a major concern and an ongoing challenge. Since cybersecurity is a critical part of any enterprise IT environment, it is important for software engineers, security, and DevOps professionals to ...
Read More »
Stuart Berman - PeerSpot reviewer
Stuart BermanI agree with many of these observations.  A trend I noticed as a security… more »
1 Comment
Alex Vakulov - PeerSpot reviewer
Alex Vakulov
Editor at a tech company with 11-50 employees
Phishing is the starting point of most cyberattacks. When sending malicious messages or creating a clone site, attackers use psychological techniques and social engineering tools, so protecting against such campaigns is not an easy task for information security professionals. To protect agains...
Read More »
Hugh - PeerSpot reviewer
Freelance Writer – B2B Technology Marketing
Journal of Cyber Policy
On Saturday, May 8, 2021, major media outlets reported that Colonial Pipeline, whose fuel pipeline network supplies gasoline, jet fuel, and other petroleum necessities to over 50 million Americans, had suffered a ransomware attack and shut down its pipeline as a precaution. The disruption in supp...
Read More »

Email Security Topics

What are the Different Types of Email Security?

Spam Filters - Marketing emails pour into most inboxes, at best clogging them with unneeded messages and at worst providing malicious links or phishing for sensitive information. Installing a spam filter can help by directing these spam emails into a separate email box so that your main inbox does not get clogged. You can also schedule them to be deleted automatically at fixed intervals.

Antivirus Protection - Even if spam emails are filtered into a separate mailbox, you might still open them and your computer and data might be compromised. Antivirus software scans your emails for malicious content and blocks them from entering or exiting your mailbox, as necessary. As opposed to a spam filter, which just redirects the messages, antivirus protection actually finds and eliminates malicious content.

Image and Content Control - Cyber attackers can include malicious software through files and links as well as images in their phishing emails.Therefore, all of these attachments must be scanned in order to protect your computer from hackers.

Data Encryption - Email data is generally transmitted in an open format and is therefore vulnerable while in transit. Your emails, including recipients’ details and message headers, should all be encrypted so that cyber attackers cannot see the contents or details of your emails. Data encryption is one of the best ways to avoid becoming a victim of phishing scams.

What are Email Attacks?

Email is the number one tool for business communication. As flexible, reliable, and convenient as it is, it is here to stay. But despite its benefits, email can be a vector for cyberattacks that can lead to data breaches and potentially billions of dollars in losses for businesses around the world. As digital technologies progress, cyber attackers continue to find new ways to exploit vulnerabilities in email accounts.

What are the Major Ways of Stealing Email Information?

Phishing is a kind of attack in which malicious emails designed to trick readers into falling for a scam are sent. Phishing campaigns generally try to get people to reveal credentials, financial information, or other sensitive data.

Spear Phishing is a targeted kind of phishing in which attackers send emails that appear to be from a trusted sender in order to obtain sensitive data. Spear phishing, which involves researching the victims and utilizing advanced intelligence strategies and social engineering techniques, is generally more successful than conventional phishing. Fewer messages are sent out, but they are more convincing.

Whaling is a form of phishing designed to target “whales” - high-profile executives - and manipulate them into authorizing high-value wire transfers to the cyber attacker. Instead of trying to get users to click on links in order to infect their computers with malware, whaling uses email and website spoofing and social engineering to trick users into disclosing sensitive information.

In a business email compromise (BEC) attack, a threat actor accesses a corporate email account and sends fraudulent emails from it in order to steal money from the company’s customers, employees, or partners.

Malware refers to malicious software designed to damage, disrupt, or gain unauthorized access to a computer system. Malware can encrypt or delete sensitive data, steal, hijack, or alter central computing functions, and monitor users’ activity without their knowledge or permission.

Ransomware is a kind of malware that blocks access to the computer system until a ransom is paid. It encrypts the victim’s files until the demanded payment has been made.

Unsolicited spam email - Aside from being annoying, spam may also contain malicious attachments or links and can also be a vector for other kinds of attacks, such as phishing and malware.

Computer viruses are a type of malware that replicate and spread by modifying other computer programs and inserting their own code. Computer viruses can harm hardware, destroy data, compromise sensitive information, and waste time, resources, and energy. Most computer viruses are email viruses, which are activated when a user interacts with the infected email by clicking on a link or downloading an attachment.

In zero-day attacks, a threat actor exploits a vulnerability before the developers have had a chance to release a fix for it. These attacks can result in data theft, lost productivity, system downtime, damaged company reputations, and regulatory actions.

What is Phishing?

Phishing is a cybercrime in which targets are contacted by email (or by telephone or text message) by a hacker who is posing as a legitimate institution in order to lure the victim into divulging sensitive data such as passwords or other credentials or banking or credit card details.

The information is then used to access accounts and steal identities and/or money.

Phishing is a cheap, easy, and effective means of cyber attack and is therefore the most prevalent type of cybercrime. 75% of organizations worldwide experienced a phishing attack in the year 2020.

“Phishing” can also be used as an umbrella term referring to any type of social engineering attack that takes place over email.

Common features of phishing emails include:

  • Attention-grabbing statements that seem too good to be true
  • A sense of urgency (e.g. limited-time offers or a threat that your account will be terminated unless you update your personal details immediately)
  • A hyperlink that is not what it appears to be or looks like a popular website but is slightly misspelled
  • An attachment that might contain viruses or ransomware
  • Something that seems off, out of character, or suspicious. Trust your instincts!
How Do You Stop Email Threats?

Here are some ways you can reduce the risk of email-based cyber attacks:

  • Protect your emails with end-to-end encryption to protect them against data leaks so that third parties can’t read them.
  • Use a spam filter, which will assess the origin of the message, the software used to send it, and the message’s appearance to determine if it is spam. Be aware that these filters are not 100% accurate and may sometimes block emails from legitimate sources.
  • Restrict administrator privileges.
  • Restrict the downloading of files from suspicious sources by changing your browser settings to block access to such sources.
  • Ensure that systems are secured with hard-to-guess passwords that are changed regularly. Never use the same password for more than one account.
  • If a website asks you for verification, check with the company personally before you enter any details online. The request may be legitimate but it may be a scam.
  • Before clicking on a link in an email, hover over the URL. A secure website with a valid Secure Socket Layer (SSL) certificate will begin with “https”.
  • Most banks and financial institutions will provide your account number or other personal details in their emails to let you know that they are being sent from a reliable source. Be wary of any emails that threaten to suspend your account if you do not update your personal details.
  • Educate your employees on how not to become prey to email threats.
What Percentage of Attacks Come Through Email?

90% of all cyber attacks come from email. Although 78% of people know not to click on a suspicious email, 4% of people who receive any given phishing email will click on it. This might not sound like a lot, but it means that for every 25 people you employ, one of them is likely to be scammed.

How to Tell if Your Email Account Has Been Hacked

Here are five signs that indicate your email account might have been compromised:

1. Your password has been changed - If you didn’t change your password but it is being rejected as incorrect, someone may have altered it.

2. Emails (either outgoing or incoming) that you don’t recognise - If you see emails in your sent mail folder that you don’t remember sending, a hacker may have access to your email account. You may also notice that you are receiving password reset emails from websites where hackers are trying to change your password.

3. Unexpected emails - If hackers have gained access to your email account, they may incorporate personal information they have found in your emails into messages they have penned from your bank or credit card company. If you receive a message like this and are unsure whether it is legitimate, call your bank to verify that they are really trying to get in touch with you.

4.Unfamiliar IP addresses show up on your log - If your email shows that you have logged in from an unfamiliar IP address, this is a sign that someone is accessing your account from another location.

5. Your contacts are receiving spam messages from you - If your friends are receiving spam from your email address, you may have been hacked and your personal data is at risk.

Buyer's Guide
Email Security
July 2022
Find out what your peers are saying about Proofpoint, Cisco, Microsoft and others in Email Security. Updated: July 2022.
620,600 professionals have used our research since 2012.