Nowcomm Cloud Email Security

Security is a continuum. Firewalls and data policies alone do not work to protect your organisation from attack. Technology evolves and employees need to work from anywhere on any device. Their device of choice may change and so too may their location. So how can you ensure your corporate email security is locked down in an ever-changing landscape? Get the lowdown on cloud email security from Nowcomm.

Did you know?

– cyber threats include malware, ransomware, phishing and credential theft.
– 80% of cyber threats start their attack journey into organisations via email.
– more than 100 billion emails are exchanged globally every day.

That’s a lot of data to protect and manage.

Cisco Cloud Security

More about Email Security from Nowcomm

Email Security Solutions from Nowcomm

With millions of inbound and outbound emails being sent each day, it’s where cybercriminals will often focus their activity. Their goal can be to steal data, identities and funds, or to disrupt and damage your internal systems. And, as your email gateway represents one of the biggest entry and exit points to your network it needs securing.

At Nowcomm, we protect businesses like yours with Cisco Email Security – securing your inbound and outbound email against cyber-nasties including: viruses, malware, ransomware, spam, and phishing.

The technology screens the body of emails, attachments and URLs within the emails – all in a bid to detect and prevent unwanted intruders, attempting to enter your organisation through email.

Our email security propositions can be provided as physical, virtual, cloud, and hybrid solutions – and can also enhance your Office 365 set-up.

Our solutions are multi-layered, responsive, intelligent, flexible and easy to install protecting you against the dynamic and rapidly changing cyber threats that exist to damage your organisation. Let us help you detect and block, the external forces that can compromise your business today.

What is phishing?

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.

Have you considered Email Security for your business?

We are here to help you every step of the way through the transition. Please contact us to discuss how Nowcomm can help.

Are you using Microsoft Office 365?

Email security is not just about checking for threats and fingerprints in emails. It is about securely tracking and monitoring emails continually from the first moment of delivery and as they travel through and around your business network, including all your Office 365 user accounts.

Outside of securing employee access and enabling business continuity whether via laptops, iPhones, Android devices and others, emails can also be accessed via any web browser through the cloud. Ensuring regulatory and organisation compliance is key when looking into your email security solutions whilst ensuring data in and out of the organisation is still happening at speed.

email security

What is Cisco Advanced Phishing Protection?

Email security is not just about checking for threats and fingerprints in emails. It is about securely tracking and monitoring emails continually from the first moment of delivery and as they travel through and around your business network, including all your Office 365 user accounts.

Outside of securing employee access and enabling business continuity whether via laptops, iPhones, Android devices and others, emails can also be accessed via any web browser through the cloud. Ensuring regulatory and organisation compliance is key when looking into your email security solutions whilst ensuring data in and out of the organisation is still happening at speed.

Step one:
Cisco Advanced Phishing Protection deploys as a lightweight sensor via the cloud or on-premise.

Step two:
Sensor receives all messages considered clean by the Secure Email Gateway

Step three:
Determine if the message is malicious

Step four:
Pre-configured policies immediately block or redirect the message for further incident investigation

Types of phishing attacks used by cyber criminals

Spear Phishing

Spear phishing is the targeting of specific individuals instead of a wide group of people. Attackers often research their victims on social media and other public sites. That way, they can customize their communications and appear more authentic. Spear phishing is often the first step used to penetrate a company’s defenses and carry out a targeted attack. According to the SANS Institute 95% of all attacks on enterprise networks are the result of successful spear phishing.

Whaling

This is when attackers go after the “big fish” like a CEO. These attackers often spend considerable time profiling the c-suite target to find the opportune moment and means of stealing login credentials. Whaling is of concern because high-level executives are able to access a great deal of company information.

Pharming

Like phishing, pharming sends users to a fraudulent website that appears to be legitimate. However, in this case, victims do not even have to click a malicious link to be taken to the bogus site. Attackers can infect either the user’s computer or the website’s DNS server and redirect the user to a fake site even if the correct URL is typed in.

Deceptive Phishing

Deceptive phishing is the most common type of phishing. In this case, an attacker attempts to obtain confidential information from the victims. Attackers use the information to steal money or to launch other attacks. A fake email from a bank asking you to click a link and verify your account details is an example of deceptive phishing.

Office 365 phishing

The methods used by attackers to gain access to an Office 365 email account are fairly simple and becoming the most common. These phishing campaigns usually take the form of a fake email from Microsoft. The email contains a request to log in, stating the user needs to reset their password, hasn’t logged in recently, or that there’s a problem with the account that needs their attention. A URL is included, enticing the user to click to remedy the issue.