The State of
Email Security 2020
Email security insights at your email perimeter,
inside your organization, and beyond
Contents
1 A guide to the email galaxy 4 The new mandate:
online brand protection
2 5 Email-borne attacks, and
why they aren’t decreasing Is cyber resilience improving?
3 6 How security awareness training
closes the understanding gap Top ten takeaways
2
1 A guide to the
email galaxy
Global business is interspersed with
a diversity of industrial sectors, united by
a single, common communication thread that
is key to any business: email connectivity.
Email continues to be the most popular attack vector,
via organizations at their email perimeters, from inside the
organization (through compromised accounts, vulnerable insiders,
social engineering), or beyond the organization’s perimeters
(the domains they own and their brands via impersonation).
Cyber threat actors and threat groups are continuously
researching and testing out new tactics, techniques, and
procedures (TTPs) in an attempt to overcome and exploit
this increasingly sophisticated and complicated technology.
4
1 A guide to the email galaxy
To add to the complexity, many global corporations
have been forced to adopt remote working policies
for office-based employees to help ensure the safety
of the workforce during the COVID-19 pandemic, and
threat actors have followed them home. An increase in
the variety and volume of attacks is inevitable given
the desire of financially- and criminally-motivated
actors to obtain personal and confidential information.
The fourth annual State of Email Security (SOES)
contains the valuable insights, reference points,
and key takeaways that you’ve come to rely on
for your organization. And with the depth of
knowledge acquired over years of monitoring
and analyzing the email security landscape,
in conjunction with Mimecast’s analysis using
detection data during the first 100-day period
of coronavirus, SOES 2020 serves as the guide
helping to drive continuous improvements to
your cyber resilience strategy.
The state of the world in the first half of 2020
is unlike anything we have experienced before,
and it’s trickled down to have an impact on the IT
and security world. As healthcare providers and
other essential employees worked as hard and
as quickly as possible to contain and mitigate
the impact of the COVID-19 pandemic, threat
actors undermined and stole from businesses,
charities, and governments. Threat actors, who
are resourceful and inventive, regularly exploit
times of confusion or global events to conduct
cyberattacks and email phishing campaigns.
They assess how well organizations secure
their networks to identify vulnerabilities in
infrastructure and defenses, which they use to
improve their attack methodologies.
While world leaders, business leaders, and
individuals come to an understanding of
how deeply this pandemic has affected us
and will continue to do so, this report will
also share theories and information on how
the pandemic has changed the landscape of
email security in 2020.
5
1 A guide to the email galaxy
Report methodology
Research firm Vanson Bourne conducted a
Mimecast-commissioned global survey of 1,025
IT decision makers to gain useful insights into
their experiences and outlook on the current
state of email security. These participants were
interviewed from February 2020 through March
2020 across the U.S., UK, Germany, Netherlands,
Australia, South Africa, United Arab Emirates
(UAE), and Saudi Arabia. This research was
supported by our own expertise, screening
more than 1 billion emails a day.
The report highlights the following key findings,
along with prescriptive guidance for how to
evolve your cyber resilience program. The key
areas of focus
included
Email and
domain
spoofing
Ransomware
Phishing
and spearphishing
Business
disruption
Cyber
resilience
strategies
Insider
threats
Online brand
protection
Malware
Awareness
training
Impersonation
6
1 A guide to the email galaxy
55%
do not provide awareness
training on a frequent basis
58%
saw phishing
attacks increase
77%
believe weak
passwords pose
a risk of a serious
security mistake
say they experienced data
loss due to lack of cyber
resilience preparedness
experienced an increase
in impersonation fraud in
the last year
have experienced
downtime from an attack
60%
82%
31%
51%
have been impacted
by ransomware in the
past 12 months
of respondents’ organizations were
hit by an attack spread from an
infected user to other employees
60%
believe their organization’s volume of
web or email spoofing will remain the
same or increase in the coming year
85%
Key findings over
the previous 12 months
7
Filter
J Inbox
HB London Office 9:41 AM
BANK ALERT ABOUT YOUR FUNDS (Urgent)
Attn: Beneficiary,
We write to inform you that Series of meetings have been held over the past
2 weeks with the Secretary General of United Nations,U.S Department of…
GM Gregory Miller 9:35 AM
Time to connect
Hi John, I actually sent you a seperate email asking to connect! Let’s plan to…
Twitter 9:38 AM
People in Manhattan shared “Is Space G…”
29
Focused Other
2 Email-borne attacks, and
why they aren’t decreasing
Four years in, the State of Email Security Report
provides a snapshot of how email attacks, from
phishing and business email compromise (BEC)
to ransomware and internal email threats, rise
and fall based on threat actors’ latest strategies.
In 2020, threats are impacting organizations at
every level.
After years of frightening narratives and
countless examples, the data points to a broad
understanding of the potential risk for emailborne attacks – in other words, sophisticated
attacks that arrive inside your environment via
the email perimeter.
Some 60% of organizations believe it’s inevitable
or likely they will suffer from an email-borne
attack in the coming year. Due to the depth of
this data and its cross-section across sector
and nation, it appears that Saudi Arabia – and
its primary source of income1, the oil and gas
industry – are on especially high alert.
60%
of organizations believe it’s inevitable
or likely they will suffer from an
email-borne attack in the coming year
1 OPEC, about Saudi Arabia
9
2 Email attacks, and why they aren’t decreasing
74% of Saudi Arabian businesses and
73% of leaders in the oil and gas industry
globally believe it is inevitable or likely
they will suffer negative outcomes
from an email-borne attack this year.
10
2 Email attacks, and why they aren’t decreasing
Impersonation fraud, business email
compromise, and email phishing
Was BEC actually all over the news in the last
year, or did it just seem like it? Some could argue
the former.2 You may be asking yourself why
this is a critical issue if you have the right cyber
resilience strategy in place to prevent these
attacks from happening, but the nature of BEC
– and impersonation fraud overall – is its ability
to bypass spam and AV filters due to a dearth of
malware or malicious URLs.
Three-quarters (74%) of respondents had seen
impersonation fraud increase or stay the same;
this represents a decrease from 78% in 2019.
Yet, a review of Mimecast’s global customer
threat intelligence data highlights the fact that
impersonation fraud increased by 30% in the
first 100 days of COVID-19.3 How can we justify
and understand this delta? Here’s one way.
Governments worldwide are cautioning against
a broad increase in impersonation; in fact, in
the U.S. the FBI warned that BEC is expected
to increase4 due to threat actors’ ability to take
advantage of the global pandemic.
Analysts from the Mimecast Threat Center
assess factors like seasonality, or a change in
threat actors’ tactics, accounts for the minor
fluctuations in impersonation, year on year.
What remains the same, however, is the use of
pattern-of-life analysis to track social media sites,
such as LinkedIn, to target individuals within
organizations who may have access to executives
and financial systems.
When it comes to phishing more generally,
72% of respondents stated it remained flat
or increased in the last 12 months at their
organizations, a jump from 69% in 2019. And,
it’s potentially becoming more difficult to stop or
prevent due to more advanced tactics like spearphishing, which increase the cyber threat actors’
probability of success, up to 75%.5
2 BEC Attacks Are Now the Top Cause of Payment Fraud, Cyber Resilience Insights
3 100 Days of COVID, Mimecast Threat Center
4 FBI.gov
5 What You Can Learn from Our Successful Simulated Phishing Attack of 45 CEOs, Rapid7
Increase of impersonation fraud
in the first 100 days of COVID-19
30%
11
2 Email attacks, and why they aren’t decreasing
Ransomware
The last 12 months were plagued by high
volumes of ransomware targeted at both the
private sector and the public sector; indeed,
the severity of the 2019 Baltimore municipality
ransomware attack6 serves as a lasting reminder
of the need for a layered approach to security.
However, organizations of all stripes face
ransomware attacks – and downtime as a
result – nearly every day.
According to just over half of respondents
(51%), ransomware attacks impacted their
businesses in the last 12 months, and by now,
we know that data loss, downtime, and loss of
reputation or trust among customers typically
accompany the financial losses. The same is
true in this year’s research: of those who
experienced a ransomware attack, they faced
3 days of downtime, which is consistent with the
2018 and 2019 reports, as well as across nearly
every sector surveyed. Despite these losses,
organizations tend to expect a less severe impact:
they reported expecting just 2 days of downtime.
This gap suggests that while we see an uptick in
understanding the need for prevention, there’s
still room for improvement when it comes to
planning for ransomware resilience.
6 Baltimore estimates cost of ransomware attack at $18.2 million as government begins to restore email accounts, Baltimore Sun
days of downtime on
average when hit with
a ransomware attack
3
12
2 Email attacks, and why they aren’t decreasing
Attack aftermath
All too often, when organizations fall victim to an
email-borne attack, it can be a herculean effort
to fully recover. Nearly a third of respondents
experienced data loss (31%), impact to employee
productivity (31%), and business interruption/
downtime (29%) due to a lack of preparedness.
But there’s a solution here, particularly for
respondents who indicated being impacted
by phishing, impersonation fraud/BEC, or
ransomware. What happens after an attack is
important. Email threats aren’t decreasing,
so it’s critical for organizations to implement
a security system for protection against data
leaks in internal-to-internal emails, data leaks
or exfiltration in outbound email, and malware
or malicious links in outbound email. On average,
6 in 10 organizations state they have some
kind of security system to protect their data or
employees in internal and outbound emails.
40% 39%
Do not have a system
for monitoring and
protecting against emailborne attacks or data leaks
in internal emails.
Do not have a system for
monitoring and protecting
against email-borne attacks
like malware and malicious
links in outbound email.
44% 42%
Do not have a system
for monitoring and
protecting against data
leaks or exfiltration in
outbound email.
Do not have a system
for automated detection
and removal of malicious
or unwanted emails that
have already landed in
employees’ inboxes.
90% of United Arab Emirates (UAE) organizations
say they have a system or are actively rolling one
out for monitoring against email-borne attacks
like malware and malicious links in outbound
email, as well as a system for automated detection
and removal of malicious or unwanted emails that
have already landed in employees’ inboxes.
Some countries, it turns out, are taking
certain security systems very seriously.
90%
UAE organizations have
a system or are rolling one out
13
2 Email attacks, and why they aren’t decreasing
3 How security awareness training
closes the understanding gap
Email-borne attacks can also disrupt business
inside the organization and network, brought on
by internal data leaks and human error. In fact,
human error plays a role in half of the world’s
data breaches,7 as employees are considered a
contributing risk factor to cyberattacks. Even the
most robust perimeter-based security system
isn’t helpful if attackers are able to penetrate
your network and operate there, undetected.
It’s everyone’s responsibility within an
organization, from the CEO down, to remain
aware of current threats and cyber vectors used
to attack an organization. So, if employees are
expected to be “the human firewall” or “the last
line of defense,” as they are often referred to,
organizations need to invest in them as such.
7 Cost of a Data Breach 2019, IBM & Ponemon Institute
8 The Forrester Wave™: Security Awareness and Training Solutions, Q1 2020
Use engaging, inclusive images
and messages to encourage
active participation.
Take a global view and
make training culturally
relevant to each region.
Foster a security culture rife with
empathy and encouragement,
instead of obligatory (or boring!)
training and testing.
Three criteria to security awareness training programs
What’s needed is a frequent, consistent, engaging
cybersecurity awareness training program,
but only about 1 in 5 respondents (21%) offer
training on a monthly basis – a timeframe experts
consider the gold standard.
Perhaps even more shockingly, 17% are only
trained once per year, a rate that neglects
to foster a comprehensive security culture
throughout the organization. If there is not a
clear cyber resilience or mitigation culture within
an organization, vulnerabilities may develop
which could be exploited. To be truly successful,
security awareness training programs need
to meet three criteria as outlined by Forrester
Research:8
15
3 How security awareness training closes the understanding gap
9 Threat Intelligence Briefing: Security Awareness Training Dramatically Reduces Unsafe Clicks Amid Surging Coronavirus Cyber Threats, Cyber Resilience Insights
With these criteria, employees can make their
training stick, playing an active role in their
organization’s cybersecurity posture. However,
the effects of infrequent or monotonous security
awareness training can have far-reaching
consequences. In fact, researchers found that
employees from companies not using Mimecast
0.05
0.04
0.03
0.02
0.01
0
1
JAN FEB MAR APR
7 13 19 25 31 6 12 18 24 1 7 13 19 25 31 6 12 18 24 30
Average unsafe clicks per user
Date
Without
Mimecast
awareness
training
With
Mimecast
awareness
training
Awareness Training were more than 5X more
likely to click on malicious links than employees
from companies that did use the training.9
The rise in unsafe clicks suggests the need to
refresh awareness training for employees and
create a more secure working environment.
more likely to click
on malicious links
Employees from companies
not using Mimecast Awareness
Training were more than
5x
16
3 How security awareness training closes the understanding gap
Additionally, in 2020, 60% of survey respondents
reported having been hit by malicious activity
spread from employee to employee.
The IT, telecoms and technology sector reports
that 70% have been hit by malicious activity
spread amongst employees.
Saudi Arabia and UAE both report higher
numbers of threats spread internally
at 84% and 74%, respectively.
Respondents believe there is a high level of risk of
employees making a serious mistake; for example,
77% believe poor password hygiene poses a risk, and
75% point to inadvertent data leaks as a high risk.
70% 84%
74%
17
3 How security awareness training closes the understanding gap
How to close the security awareness gap
Overall, organizations are taking security
awareness training more seriously; security
awareness training has a high level of awareness
(no pun intended) for its success rate. In fact,
nearly all of respondents’ organizations (97%)
offer some kind of training at varying frequencies
and formats. About 6 in 10 offer group training
sessions, while around 4 in 10 offer various other
types like online tests, emailed or printed tips, or
1:1 training.
Respondents told us they offer training that was
developed in-house, which can lead to infrequent
or inconsistent training modules. Just 23% are
using training videos, and barely 1 in 5 (18%) use
a single third-party provider.
With frequent, consistent, engaging content that
humanizes security, security awareness training
is an effective way to reduce risk inside the
network and organization. of public sector/education sector
respondents rely on trainings
developed in-house due to cost.
55%
of respondents from the energy,
oil and gas sector rely on in-house
trainings, indicating an effectively
trained workforce.
33%
18
3 How security awareness training closes the understanding gap
4 The new mandate:
online brand protection
In today’s global business environment,
the only guarantees are risk and uncertainty.
And as domain-spoofing and email-spoofing have evolved to become
mainstream attack vectors, particularly during the global COVID-19
pandemic, it’s critical for organizations to look beyond their email
perimeters to determine how cyber threat actors may be using and
damaging their brands online.
Brand trust is incredibly important; if your brand website is cloned and
credentials were stolen as a result, then trust in your brand is already
in question. Even unsophisticated attackers can trick unsuspecting
website visitors, which can unravel years’ worth of brand equity.
And if you’re unaware it’s happening, you can’t solve the problem.
20
4 The new mandate: online brand protection
DMARC and brand protection
Domain-based Message Authentication,
Reporting & Conformance, or DMARC, is an email
validation system designed to uncover anyone
using your domain without authorization, and
ultimately block delivery of all unauthenticated
mail. There are positive implications for both
email senders and email receivers too: on the
sender side, the DMARC system helps protect
customers and supply chain by monitoring who’s
sending email on your behalf, and on the receiver
side, it protects employees by distinguishing
between legitimate and fraudulent senders.
There’s high awareness around DMARC and its role
in helping to secure email from threats like spam,
phishing, and email spoofing.
97%
of respondents were
aware of DMARC
28%
already use DMARC
Only
21
4 The new mandate: online brand protection
Brand protection in the C-suite
But while online brand protection has emerged
onto many companies’ radars in the last two
years, it’s still not quite risen to boardroom
importance.
The KrebsOnSecurity analysis of the global top
100 companies by market value10 showed that
just 5% of companies listed their CSO or CISO
among the executive team; these roles usually
report to CIOs due to executive silos. But given
the importance of financial data managed by
the CFO, employee data handled by the CHRO,
or intellectual property managed by the CPO,
shouldn’t the security of the brand be elevated
into the executive level?
In any case, the good news is there’s widespread
visibility into budgeting for brand protection; 98%
of respondents reported their organization has
a dedicated budget for online brand protection
strategies. On the flip side, if this budget isn’t
allocated properly – for example, with oversight and
partnership from a security-savvy C-suite officer,
there’s potential for a delayed attack response.
In 50% of organizations, the CIO holds
budget for email spoofing, exploitation and
impersonation, followed by the CISO (42%), CFO
(22%), CMO (8%), and legal/compliance (8%).
This budget breakdown is a heartening one –
some organizations are treating online brand
protection as the cross-functional business issue
that it is, instead of relegating it as an overly
technical security matter.
With this in mind, it’s imperative that CISOs and
CFOs partner to manage corporate brand. CFOs
– while not usually known for their keen sense
of cybersecurity – are perhaps best suited to
make decisions that keep their business stable
and operationally healthy. Working in lockstep
with the CISO or CIO, the CFO can guide risk
management and budget management towards
a balanced approach to brand protection.
10 A Chief Security Concern for Executive Teams, Krebs on Security
It’s much more likely for
CFOs in Saudi Arabia, UAE,
South Africa, and the
Netherlands to manage
budget for corporate
brand at 48%, 34%, 39%,
and 36% respectively.
22
4 The new mandate: online brand protection
54%
53%
48%
53%
46%
55%
35%
Web and email spoofing
Nearly half of organizations (49%) surveyed
report anticipating an increase in web or email
spoofing and brand exploitation in the next
12 months, yet 84% report feeling concerned
about a web domain, brand exploitation, or site
spoofing attack. The same 84% are concerned
about an attack that would directly spoof their
email domain.
In fact, these concerns are justified: there are
numerous reported web and email spoofing
attacks, and on average, organizations have
been made aware of 9 web or email spoofing
attacks in the last year. This doesn’t show the
whole picture; there could be many more.
After all, unless you’re actively looking for these
exploits, or unless someone takes the time to
report them to you, they’re difficult to find as
they often don’t arrive to your organization.
All regions expect web and email spoofing
attacks to increase in the coming year,
with the U.S. (55%), Saudi Arabia and UAE
(53%), and UK (54%) on the highest alert.
In the US the average goes up to 11,
followed by Germany and the UK, both
at 9 average attacks in the last year.
23
4 The new mandate: online brand protection
This high level of concern from respondents may
be indicative of a stronger understanding of the
threat landscape, the diverse number of cyber
threats to organizations, or the strong certainty
of attack. The Mimecast Threat Center has seen
countless incidents of brand exploits in the
first few months of 2020 due to the COVID-19
pandemic. For example, the retail sector was
heavily targeted with spoofing of major retail
brand domains that preyed on insecurities
around product shortages.
24
4 The new mandate: online brand protection
5 Is cyber resilience
improving?
In 2019, 75% of respondents either had a cyber
resilience strategy or were actively rolling one
out. This year, it’s gone up to 77%, and email
security (71%), network security (66%), web
security (63%), and data backup/recovery (62%)
are once again the most common components of
a cyber resilience strategy. Just over a third (34%)
included brand exploitation protection for emailspoofing and website-domain spoofing, while
39% noted their strategies included penetration
testing for key systems and regularly testing
incident response processes.
Yet, 1 in 5 respondents are planning to implement
a cyber resilience strategy at some point in the
next 12 months or beyond, begging the question:
why hasn’t one been implemented yet? Given the
data indicates that organizations are still seeing
data loss (31%), a negative impact to employee
productivity (31%), and business downtime (29%)
due to a lack of cyber resilience preparedness,
a cyber resilience strategy seems prudent.
While cyber resilience strategies vary from
organization to organization – and certainly they
differ across sectors depending on the regulatory
or industry needs – they reflect a sense of
awareness and preparedness about what threats
might come their way. This year, the data suggests
a high level of confidence in the respondents’
cyber resilience strategies, but it also shows a clear
need for improvement given we’re still seeing
significant levels of data loss and downtime.
Who should take responsibility and ownership
of cyber resilience? It’s a complicated question,
and unfortunately there is no one-size-fits-all
plan. However, it is cross-functional, meaning
the CIO or CISO shouldn’t hold sole ownership,
so we should treat it as such. Cyber resilience is
a risk management issue, and much like budget
ownership for online brand protection, organizations
should guarantee a partnership between senior
leadership functions to ensure success.
The financial services industry appears to be
the most stacked: organizations in this sector
stand out by having not just the highest rates
of foundational protections like email, network,
and endpoint security, but also internal email
protection (68%), penetration testing of key
systems (53%), brand exploitation protection
(41%), and security orchestration, automation
and response, or SOAR (37%). The Mimecast
Threat Center assesses this is a necessary
development; as attacks have become more
opportunistic and sophisticated, alongside
the increasing threat of ransomware, the
financial services industry will need extremely
comprehensive measures in place for security –
and business continuity.
The healthcare industry stands out for its
dedication to security from inside the network.
It exceeded industry averages with strong
implementations of internal email protection
(71%), user awareness training (63%), and web
security (73%).
Data loss
31% of organizations are seeing
Negative impact
to employee
productivity
31% of organizations are seeing
Business
downtime
29% of organizations are seeing
26
5 Is cyber resilience improving?
This year, due to the pandemic, the stakes
for cyber resilience are much higher.
With employees working remotely in unprecedented numbers,
potentially exposing their organization to greater risk,
cyber resilience strategies coupled with fortified cybersecurity
awareness training will be critical to keeping the business
operating efficiently.
According to the Mimecast Threat Center, these measures
may represent the biggest difference between survival or
failure during the COVID-19 crisis.
27
5 Is cyber resilience improving?
As more users move to cloud-based email,
they experience the benefit of predictable costs,
better collaboration, a simplified infrastructure,
and critical services like data protection. But
on the security front, when a popular platform
like Microsoft 365 is missing necessary security
layers, users may receive emails that should
otherwise have been held. There can also be
challenges with business continuity; if there’s
even a short outage, users are more likely to
bypass corporate security with personal email
accounts to conduct business.11
Microsoft 365 and a layered security approach
According to 96% of respondents at small- and
medium-sized businesses, as well as enterprises,
the overwhelming choice for email provider
was Microsoft 365. However, there’s room for
improvement when it comes to security and
resilience: only about 1 in 5 (22%) agree that
Microsoft 365 provides world-class security
for their organizations. Meanwhile, 59% of
respondents experienced a Microsoft 365 outage
in the last 12 months. At present there is no
in-built, or inherent business continuity,
within Microsoft 365 services should there be
an interruption to Microsoft cloud services
via common attack methodologies, such as
a DOS attack, a datacenter hardware failure,
or other form of interruption in relation to
their cloud services.
With the number of outages occurring, 65%
of respondents state they have already added
or are in the midst of adding additional layers
of continuity and cyber resilience.
11 Top 5 Reasons to Build Cyber Resilience Into Office 365 Email, Cyber Resilience Insights
59% of respondents
experienced a
Microsoft 365 outage
in the last 12 months
28
5 Is cyber resilience improving?
6 Top ten takeaways
1
3
Leaders are beginning to understand the email
perimeter is constantly under attack.
The magnitude and scale of possible attacks at
the email gateway is of concern to most; 60% of
respondents believe it’s inevitable or likely they will
suffer from an email-borne attack in the coming year.
The effects of ransomware still aren’t
improving year over year.
More than half of respondents experienced a
ransomware attack this year, and in 2018, 2019,
and 2020 respondents experienced an average
of 3 days of downtime.
2
4
Impersonation, phishing, and business email
compromise are increasing at a concerning clip.
72% of respondents saw an increase in phishing at their
organizations, and due to the global pandemic, threat
actors are broadly using impersonation and BEC to
steal from unsuspecting users. The Mimecast Threat
Center corroborated this assessment – researchers saw
a staggering 30% jump in impersonation from January
to April 2020.
Monthly security awareness training is the best
way to train employees, but it’s not happening.
21% of respondents offer training monthly,
and most organizations aren’t educating
employees according to best practices.
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
30
6 Top ten takeaways
5
7
In the absence of security awareness training,
unsafe URL clicks and data leaks will ensue.
Mimecast Threat Center found that employees from
companies not using Mimecast Awareness Training
were more than 5X more likely to click on malicious
links than employees from companies that did utilize
the training. The risk these clicks pose is significant:
60% of respondents were hit by malicious activity
spread from employee to employee.
Budget ownership for online brand protection
may shed light on how quickly an organization
can respond to an attack.
Nearly all organizations – 98% - have a dedicated
budget for email spoofing, exploitation and
impersonation. Who manages the budget, whether
it’s the CIO, CISO, CFO, CMO, can vary; what’s critical
is the partnership between the budget owner and
a savvy cybersecurity leader that leads to the right
knowledgebase and tools investment to detect and
respond to brand exploit.
6
8
Looking beyond your email perimeter towards
online brand protection is a business issue that
can no longer be ignored.
There’s high awareness of the need to protect your
online brand and maintain customer trust, but just
because the attacks aren’t visible to you, doesn’t
mean they’re not happening. 97% of respondents
are aware of DMARC, but it’s just one piece of the
brand protection puzzle.
You’re right to have growing concern
about web and email spoofing.
On average, there are 9 web or email spoofing attacks
per organization each year – and that’s just what
they know about. 49% of respondents anticipate an
increase in web or email spoofing in 2020, and the
majority (84%) are concerned about direct brand
exploitation or email domain spoofing attacks.
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
31
6 Top ten takeaways
9
If there’s one thing we all agree on,
it’s that cyber resilience strategies are
necessary but still incomplete.
More than three quarters (77%) have a cyber
resilience strategy or are actively rolling one
out, and respondents told us their strategies are
stacked with email security, network security,
web security, and data backup and recovery
solutions. But respondents are still experiencing
data loss (31%), a negative impact to employee
productivity (31%) and business downtime (29%)
due to a lack of cyber resilience preparedness. 10
When it comes to delivering world-class security,
Microsoft 365 needs more cyber resilience.
While 96% of respondents use Microsoft 365 for email
delivery, the impact to their organizations following
an outage or other security event created a lasting
impression of the need to build in greater resilience
with components like email security.
$
1 2 3 4 5 6 7 8 9 10
$
1 2 3 4 5 6 7 8 9 10
32
6 Top ten takeaways
The bottom line
2020
The state of email security in
2020 is unlike any other year,
and business as usual is a
phrase we can no longer use.
At the close of 2019, many IT and IT security decision makers were planning to bolster
their security posture with protections at the email gateway, within their organizations to
protect employees and customers, and beyond their organizations’ four walls to uphold
brand trust. These protections are still underway; in fact, they are more critical than ever.
At the same time, comprehensive data from Mimecast Threat Center indicates a severely
negative impact to businesses in the first half of 2020, and experts predict we’ll see these
attacks for months to come. Threat actors are relying heavily on impersonation and brand
exploitation to take advantage of the uncertainty during the global COVID-19 pandemic.
The usual email and web security defenses are no longer good enough; to prevent and
protect your business against threat actors now and in the future, it’s critical to integrate
security awareness training as well as to protect your online brand.
33
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and
bolster cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber
resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance
and more, Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Visit mimecast.com/state-of-email-security to learn more
Source .mimecast.com