[Infographic] Email: The First Security Gap Targeted by Attackers
-
Upload
fireeye-inc -
Category
Technology
-
view
83 -
download
1
Transcript of [Infographic] Email: The First Security Gap Targeted by Attackers
FireEye Email Security: Better Protection from Email-Borne Attacks
PROTECT YOUR PEOPLE, DATA AND ASSETS WITH FIREEYE EMAIL SECURITY
Reduces business risk of unauthorized access
Saves operation costs Deploys in minutes with no physical infrastructure
Learn More at FireEye.com/email
Industry-leading detection of, and protection from, advanced persistent threats to safeguard
business assets
Real-time, automated protection from spear-phishing and other socially engineered attacks to minimize impostor
‘calls-to-action’
Flexible deployment models to support on-premise, cloud and
hybrid email environments
Always up-to-date on the latest protection; no upgrades
needed
Comprehensive, contextual threat intelligence to provide
your security team the information it needs to respond
to threats
Protection from hard-to-detect multi-vector, multi-flow attacks
THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT
FINANCIAL
REMEDIATION
REPUTATION
$3.8MILLION3
82TO CONTAIN A BREACH
AVERAGE COST OF BRAND DAMAGE DUE TO ADVANCED PERSISTENT THREATS
$9.4MILLION5
DAYS4
The attacker targets a global shipping company and identifies an IT manager inside — learning
about them through social media.
An email is crafted to appear like it’s from the IT manager’s boss,
recommending a critical software update.
The IT manager, assuming the email is real, clicks on a link embedded in the email to
install the software update.
Malware is downloaded from the attacker’s server and infects the IT
manager’s machine.
Passcodes that control the shipping company’s closed circuit television network are exfiltrated.
The attacker disables the closed-circuit television cameras,
steals the containers, and flees the scene.
RECON SOCIAL ENGINEERING SPEAR PHISHING
INFECTION EXFILTRATION MISSION ACCOMPLISHED
How attackers steal shipping containers with a single spear-phishing email.
1 Radicati Group Email Statistics Report, 2015-2019.
2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/
3 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute.
4 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute, https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF
5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014.
© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
ATTACKERS TYPICALLY TARGET
AN UNEXPECTED TARGET
However, attackers are beginning to focus oninformation that allows them to go after physical assets.
INTELLECTUAL PROPERTYFINANCIAL DATAHIGH-VALUE PEOPLE
EMAIL THE FIRST SECURITY GAP
TARGETED BY ATTACKERS
2.5 BILLIONTHERE ARE APPROXIMATELY
EMAILS SENT EVERY DAY1
2 3 SPAM2
NEARLY EMAILS AREOF EVERY