Email Security Blog

Email Fraud Discovery and Prevention – Top Phishing Attacks of 2016

Nikki Tyson July 19, 2016 Email Security
Fallback Featured Image

In this series of blog posts we have examined the most common forms of email fraud and phishing attacks and appropriate countermeasures to protect both individuals and organizations.

It’s important to remember that any organization that uses email is vulnerable to a phishing attack that can be used to intercept valuable information or commit financial fraud. The last year has been particularly tough for organizations with major brands and government agencies suffering attacks.

The Email Fraud Outlook

The outlook for email fraud and phishing attacks shows no signs that the situation is getting any better. In the next year, we’re likely to see more attacks designed to disrupt business operations. In addition, we’re also likely to see a rise in organizations that have never previously seen themselves in the crosshairs being targeted by non-traditional attackers.

Steps to Reduce Risk

Here are our top tips on how organizations can better protect themselves to reduce risk:

  • Greater collaboration – be engaged with your industry peers and law enforcement to share data and experiences on attack
  • Remember, it could be you! – plan for the worst case scenario, engage expert security industry support and fully exercise incident response teams regularly
  • Know your strongest assets – adopt the mind-set of an adversary and review the data stored within the enterprise to ensure strong controls, such as encryption, are in place
  • Introduce new controls – take advantage of advanced, multi-layered security technologies to minimize risk of susceptibility to attack
  • Restore trust in the digital ecosystem – email continues to be the primary way criminals infiltrate an enterprise. Successful attacks feature identity deception at their core so companies need to change their approach and combine threat intelligence with open standards to ensure employees only interact with legitimate messages.

Download Agari’s executive brief on the Top Phishing Attacks of 2016 to learn more about best practices to stopping phishing attacks.

You can also check out the other posts in the Top Phishing Scams series:

Leave a Reply

Your email will not be published. All fields are required.

Agari Blog Image

August 15, 2019 Paul Lorence

Building a Career at Agari: One Designer’s Experience

Being a user experience (UX) designer and managing design teams is a rewarding job. I…

Agari Blog Image

August 1, 2019 John Wilson

Email @ttack: Why Identity Deception is Your #1 Threat

Want to know how email became the number one attack vector for cybercriminals? Look no…

Agari Blog Image

July 31, 2019 Armen Najarian

2020 Presidential Candidates Remain Vulnerable to Email Fraud Despite Increased Warnings

Only three months ago, the Agari team published our first in-depth analysis on how the…

Agari Blog Image

July 25, 2019 Scot Kennedy

Using ML to Stop Latent Email Attacks That Dodge Early Detection

When implemented effectively, real-world deployments of machine learning (ML)-based email security can block business email…

Agari Blog Image

July 18, 2019 Patrick Peterson

Businesses Grow More Vulnerable to Email Attacks, Even with Improved Defenses

Cybercriminals increasingly use new forms of identity deception to launch an email attack to target…

mobile image