Email security (3) - A must-see for companies that have introduced Office365! What cloud email security should be implemented now

Many cyber crimes are said to start with emails.

Although companies have introduced email security products and are taking countermeasures, the current situation is that attackers are also trying to infiltrate using all possible means.

In particular, the number of companies using Office 365 has increased significantly, and simultaneous attacks against multiple targets have been carried out.

Unknown threat detection and analysis of various file types are important for the secure use of Office 365.

In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures and introduce an effective FireEye Email Security solution for companies that are considering introducing Office 365.

table of contents

  • Current Status of Cyberattacks Using Email
    What is the method that has changed from malware attachment?
  • phishing attack
    Introducing phishing attacks impersonating Microsoft, which surged in 2019
  • Standard functions are not enough to use O365 safely
    How does Office 365 respond to unknown malware and phishing emails?
  • Reality of passing through
    FireEye Email Security detection results released!
  • What FireEye Email Security Can Do
    How are you parsing the emails after the attack emails are sent?

(1) Current state of cyberattacks using e-mail

91% of cyberattacks start with receiving malicious emails. We are changing the method from attaching malware to phishing sites using URLs. Many organizations are also victims of spear phishing, which accounts for 84% of the total. From this, we can see that attacks that do not use malware are increasing, and attackers are changing their method from attaching malware to phishing sites using URLs. Therefore, there is a need for a solution that can not only inspect attachments, but also thoroughly inspect URLs in emails for maliciousness.

  • Eメールを悪用したサイバー攻撃の現状

91% of cyberattacks start with receiving malicious emails. We are changing the method from attaching malware to phishing sites using URLs. Many organizations are also victims of spear phishing, accounting for 84% of the total. From this, we can see that attacks that do not use malware are increasing, and attackers are changing their method from attaching malware to phishing sites using URLs. Therefore, there is a need for a solution that not only inspects attachments, but can also inspect in detail whether URLs in emails are malicious or not.

In the following chapters, we will introduce the results of a survey conducted by FireEye on the number of phishing attacks spoofing Microsoft, and the results of FireEye Email Security's detections regarding the bypassing of Office 365.

Detailed document "A must-see for companies adopting Office 365! What is cloud email security that should be implemented now?"

Contact information

Macnica
FireEye product manager