Introduction

General Information

Over 95% of system breaches have been caused by an email-based cyber attack. Today, phishing attacks continue to be one of the successful attack genre initiated mostly by email. Especially, spear phishing, an attack schemed against a particular individual, has been widespread to manipulate high-profile incidents.

Best option to defend against phishing is to train people in a repetitive method, that they will be familiar with typical behaviour to see and avoid phishing schemes, and understand what to look for to hinder phishing emails.

Therefore, to keep data safe and shield against this attacks, organisations need awareness training for their employees as well as a mix of technical measures because employees can also put any network at risk from their email. Therefore, Keepnet Labs developed a suite of defence solutions to prevent the email-based cyber attacks with a holistic approach to people, processes and technology.

Keepnet Labs focuses on cyber threats coming from email

Keepnet Labs focuses on cyber threats coming from email Four out of five organisations (80%) have faced an email-based cyber attack in 2017. Email is a critical threat vector, which allows malicious third parties to target employees within an organisation directly.

Today companies are using tools like many border security components such as AntiSpam, Firewall, Intrusion Detection and Prevention Systems (IDS / IPS) as well as Data Leakage Prevention (DLP) systems. Moreover, sometimes they take additional measures like a zero-day protection product, reputation analysis service, cyber intelligence support. Well, how much do these systems protect systems from email-based cybersecurity attack vectors?

Also, despite the availability of tools and technologies such as email encryption, data loss prevention, social engineering detection, phishing simulation and artificial intelligence which can help mitigate email-based cyber threats, the risks are subsisting.

Therefore, Keepnet Labs protects businesses through the life cycle of email-based attacks and provides a holistic approach which embraces people, processes and technology elements for a complete solution.