Security Basics: Email Security

This post is one in a series of blog posts on the fundamentals of an information security program. You can see the complete list of posts in this series here.


Of all the common applications in most organizations, email is perhaps the most basic and essential. Any systems administrator knows that if email goes down they will hear about it very quickly!

Email is also the very most common route for systems intrusions to begin in the modern enterprise. The most common example is "phishing" or "spear phishing" messages that lead to malware infections; the difference between the two is that general "phishing" is aimed at a broad audience (think of fishing with a tuna net) and spear phishing is aimed at one target or a small group of targets (think of fishing with, well, a spear). The malware can be anything from "ransomware" that tries to encrypt your files and hold them for ransom to a remote access trojan (RAT) that silently gives a hacker access to your system.

                  vs                  

                                                                         "Phishing" versus "spear phishing"

Malicious software is usually delivered via email in one of two ways. In the first case, an attached file contains code that exploits a vulnerability in the software used to open the file (e.g., Adobe Reader, Microsoft Word). In the second case, the email contains a link to a website or other online resource and that online resource delivers the malware, typically by exploiting a vulnerability in some element of the web browser.

The following are some key features and considerations to keep in mind with email security software or services:
  • Spam filtering. Spam is primarily thought of as a nuisance, but malicious emails are often sent out to broad lists of people and can be caught by spam filtering as well.

  • Malware scanning. Most scanning for malicious software depends on looking for known bad files as attachments and/or websites linked in an email based on their known "signatures." This type of scanning may miss new threats or those not previously identified, but it will detect the majority of malicious files and links. Some newer systems can dynamically check files and links for suspicious behavior, thus detecting many threats for which no signature would exist.

  • Anti-spoofing. Your email security system should make it impossible for someone to send email into your network that would normally originate from inside your network. One of the most dangerous types of email scams involves emails sent to employees that appear to come from someone else in the company (typically senior management) requesting information or a financial transaction. Companies have lost millions by making wire transfers in response to such emails.

  • Geo-IP detection and filtering. Email scams and attacks are often sent from servers that an attacker has gained control of illegitimately. However, many still originate directly from known trouble spots like Nigeria, east Asia, and eastern Europe. If you don't do much international correspondence, it may be preferable to filter out or flag email originating from unusual geographical regions.

  • Encryption. Some security solutions enable you to encrypt emails on demand. Some require a plug-in or add-on for your email software to do this. Others simply do it automatically if you include the appropriate keyword in the email subject and/or body.

  • Content filtering. Some email security systems have data loss prevention features. These allow you to set certain keywords or data types (e.g. Social Security numbers or credit card numbers) for the email security software to search for in emails. You can then block, re-route, flag, or (in some cases) encrypt emails that match the search.

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February