Categories: General
      Date: Feb 17, 2017
     Title: Email security

Email Security

In a previous article, I wrote about the increase in Ransomware attacks how to counter and prevent them, and more importantly, how to plan your recovery, post attack.

This article will deal with an overall strategy as regards your email security and the prevention of attacks.

It is no secret that large corporations are the constant focus of the black hat underworld, ready to pounce and always ready to exploit. Phishing, whaling and ransomware attacks typically originate as emails, bypassing the traditional “steel wall” of defence a traditional firewall and anti-virus suite would offer the client. It is estimated that more than 90% of attacks originate as an email. Much like the proverbial “castle and moat with drawbridge” protection, the classic hard network perimeter protection is obsolete. One only has to consider the perimeter-less nature of “the cloud” to recognise the risk. Add to that a typical mix of staff (many being IT illiterate), mobile devices, bad BYOD policies and the like, and the reality is; most companies are vulnerable.

While one cannot realistically prevent ALL attacks, focus on three critical areas will much reduce company risk.



How to recognise that an attack is being initiated


How to prevent an attack


Finally, the glue that holds all your plans together is a full buy in by your company executive. Having the best security expert advising and protecting is worth zip if the top team don’t recognise the value of this investment. The education process often has to start here……

Select IT’s consultants are there to advise and assist you in this matter, please feel free to call or email me to schedule a free assessment of your infrastructure.

Anton Schutte

027 524 9995