{"id":3389,"date":"2022-05-23T11:22:15","date_gmt":"2022-05-23T05:52:15","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=3389"},"modified":"2022-05-23T11:22:53","modified_gmt":"2022-05-23T05:52:53","slug":"which-emails-suffer-the-most-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/","title":{"rendered":"Which Emails Suffer The Most Cyberattacks"},"content":{"rendered":"<p>Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering investing in email <a href=\"https:\/\/www.trendstechblog.com\/category\/security\/\"><span style=\"color: #0000ff;\"><strong>security<\/strong> <\/span><\/a>solutions that, among other capabilities, must report on which emails suffer the most cyberattacks to apply specific and practical measures.<\/p>\n<p>A few years ago, jealous initial secrecy was replaced by a continuous chain of news about companies of all kinds that have suffered cyberattacks. Email is the starting point for many of them, so its protection must be a priority in the corporate cybersecurity strategy. The possibility of accessing grants from the Digital Kit to implement or optimize cybersecurity solutions is an excellent opportunity to deploy tools to protect corporate email.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655dcc77f3d5e\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655dcc77f3d5e\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#Main_Email_Cyberthreats\" title=\"Main Email Cyberthreats\">Main Email Cyberthreats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#Basic_Solutions_To_Protect_Email\" title=\"Basic Solutions To Protect Email\">Basic Solutions To Protect Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#Block_Email_Cyberattacks_And_Prevent_Them_What_Is_Very_Attacked_People\" title=\"Block Email Cyberattacks And Prevent Them: What Is Very Attacked People\">Block Email Cyberattacks And Prevent Them: What Is Very Attacked People<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Main_Email_Cyberthreats\"><\/span>Main Email Cyberthreats<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cybercriminals discovered long ago that it is easier to target people than systems. Social engineering tests people&#8217;s caution when opening email, downloading files, or entering web pages through them. All of them are actions that can camouflage a cyber attack. Identity theft is the origin of the majority. It consists of the user receiving an email from a reliable person or entity and confidently carrying out their proposed actions, mainly making economic transfers.<\/p>\n<p>This is how the cases of so-called CEO fraud arise (a supposed manager who suggests making a payment) and phishing (an email is received with a corporate image very similar to that of a company that is usually contacted in which access is requested. to a website to make a payment). Other times, downloading attachments or simply opening emails launch viruses and malware capable of blocking systems and corporate websites ( DDoS denial of service attacks ) or encrypting critical data. They are the dreaded ransomware that demands a ransom to restore compromised assets.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Basic_Solutions_To_Protect_Email\"><\/span>Basic Solutions To Protect Email<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These actions in private emails already cause enough damage, but their impact within a shared and intercommunicated network can be lethal for business continuity. That is why it is essential to deploy cybersecurity solutions for email. Those solutions include both technological tools and a high dose of common sense. For starters, generating solid passwords is critical. In this way, it is difficult to steal these to access contact lists and impersonate identities. In this sense, it is recommended to configure them by mixing numbers, letters, uppercase, lowercase, and symbols.<\/p>\n<p>It is important to frequently change passwords, something that complicates their use and administration. There is the possibility of storing them in a password manager safely and quickly starting the session that is needed. Email security is linked to antivirus, firewall, antispam and antispyware products to prevent and detect threats, but it is highly recommended to complement their potential with email threat simulators. These serve to simulate phishing attacks, audit the network&#8217;s state and the products mentioned above, and educate users by putting them to the test.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Block_Email_Cyberattacks_And_Prevent_Them_What_Is_Very_Attacked_People\"><\/span>Block Email Cyberattacks And Prevent Them: What Is Very Attacked People<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In addition to the considerations just discussed, the Proofpoint <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/category\/technology\/\">technology<\/a><\/span> we work with at Orbit Consulting Group, as a specialist in email protection solutions, includes VAP (Very Attacked People) tools.<\/p>\n<p>And it is that to prevent, detect and correct the attacks directed at corporate emails, it is necessary first to know which people are the most attacked by email. Knowing which are the most attractive profiles for cybercriminals makes it possible to identify which accounts have the most significant potential risk to act precisely on them, prioritizing mitigation.<\/p>\n<p>Proofpoint is a leading global provider of email security technology. Its VAP solution generates a Personal Risk Index that provides a weighted composite score of all the threats an individual experiences, based on four key factors:<\/p>\n<ul>\n<li>Volume<\/li>\n<li>Type<\/li>\n<li>Targeting level<\/li>\n<li>Attacker sophistication<\/li>\n<\/ul>\n<p>This tool to identify which people suffer the most attacks on their email differentiates Proofpoint from other manufacturers of cybersecurity solutions.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/robots-of-the-future\/\">The Robots Of The Future, What Can We Expect From These Super Evolved Machines<\/a><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[96,649,745,171,205],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which Emails Suffer The Most Cyberattacks<\/title>\n<meta name=\"description\" content=\"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which Emails Suffer The Most Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-23T05:52:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-23T05:52:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2022\/05\/Email.Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Which Emails Suffer The Most Cyberattacks\",\"datePublished\":\"2022-05-23T05:52:15+00:00\",\"dateModified\":\"2022-05-23T05:52:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\"},\"wordCount\":651,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Cybersecurity\",\"Email\",\"Emailsecurity\",\"Internet\",\"Marketing\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\",\"url\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\",\"name\":\"Which Emails Suffer The Most Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2022-05-23T05:52:15+00:00\",\"dateModified\":\"2022-05-23T05:52:53+00:00\",\"description\":\"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Which Emails Suffer The Most Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Which Emails Suffer The Most Cyberattacks","description":"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"Which Emails Suffer The Most Cyberattacks","og_description":"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.","og_url":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/","og_site_name":"Trends Tech Blog","article_published_time":"2022-05-23T05:52:15+00:00","article_modified_time":"2022-05-23T05:52:53+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2022\/05\/Email.Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Which Emails Suffer The Most Cyberattacks","datePublished":"2022-05-23T05:52:15+00:00","dateModified":"2022-05-23T05:52:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/"},"wordCount":651,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Cybersecurity","Email","Emailsecurity","Internet","Marketing"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/","url":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/","name":"Which Emails Suffer The Most Cyberattacks","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2022-05-23T05:52:15+00:00","dateModified":"2022-05-23T05:52:53+00:00","description":"Emails have become the main gateway for cyber attacks on companies. In this post, we review what aspects must be considered when considering.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/which-emails-suffer-the-most-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Which Emails Suffer The Most Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3389"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=3389"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3389\/revisions"}],"predecessor-version":[{"id":3391,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3389\/revisions\/3391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/3390"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=3389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=3389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=3389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}