cxo voice
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk
No Result
View All Result
Leaders Talk and Latest Tech News | CXO VOICE
No Result
View All Result
Home News Cyber Security

What is email security? and its importance in securing enterprise networks

Exclusive Interview with Sundaresan Kanappan, VP and Country General Manager of Tech Data India

Deepa Sharma by Deepa Sharma
November 1, 2022
Reading Time: 7 mins read
email security interview

Photo: Sundaresan Kanappan

Share on FacebookShare on Twitter

Cybercrime cases have drastically increased in recent times. A report says 91% of cyber attacks start from email. Targeting via email is the most favorable method for cybercriminals to infiltrate your system and your organization’s IT infrastructure. In an exclusive interview with CXO VOICE, Sundaresan Kanappan, VP and Country General Manager of Tech Data India, explains various points related to email security, its importance, roles, how organizations should manage it to tackle emerging threats. 

What is the email security, and its role in securing enterprise networks?

Sundaresan Kanappan: On average, each of us receives about 100 emails daily, and globally about 300 billion emails are sent and received daily. With such high volumes, email is the number one vector for cyberattacks, with 91% of all cyberattacks starting via email.

Email security protects email accounts and communications from unauthorized access, loss of information, or compromise from malicious threats, including spam, malware, and phishing attacks. 

Because emails were designed to be as open and accessible as possible, they can be intercepted by any viewer. This is especially the case with enterprise networks, wherein emails being a popular mode of communication, are also a common entry point for cybercriminals. 

Email security combines tools such as Secure Email Gateway (SEG), Domain-based Message Authentication, Reporting & Conformance (DMARC), and email encryption solutions for enterprise networks that typically have large infrastructure setups.

It can also incorporate emerging technologies and techniques, such as Artificial Intelligence (AI) and Machine Learning (ML), to further strengthen email defense and resilience strategies. 

ADVERTISEMENT

What are the top email security threats for organizations, and how to tackle them?

Sundaresan Kanappan: Some of the top email security threats include: 

1. Phishing is the most prevalent type of email security threat, where attackers send a fraudulent email, often pretending to be a well-known and trusted brand. It is designed to trick individuals into disclosing sensitive personal information, including usernames, passwords, and credit card details.

According to the IC3 Internet Crime Report released by the FBI in March this year, phishing variants accounted for 69.4% of reported cybercrimes. The number of phishing attacks has tripled since 2020.

2. Ransomware attacks are the most public and high-profile email security threats, especially in incidents where large volumes of user data are stolen or where the services and operations of the target company are disrupted. Earlier this year, CISA, the FBI, NSA, and other international partners issued an advisory stating that ransomware groups have an increasing impact due to approaches targeting the cloud, managed service providers, industrial processes, and the software supply chain.

Ransomware is now a sophisticated industry with ‘professional’ organized crime groups offering ‘Ransomware-as-a-Service’ (RaaS) services for hire, including exploit kits and 24/7 support centers.

3. Business Email Compromise (BEC) attacks have become increasingly common and complex since the COVID-19 pandemic began, in tandem with the proliferation of remote work. No longer limited to just email, fraudsters use virtual meeting platforms (like Microsoft Teams or Zoom) to impersonate a CEO or CFO to instill a sense of trust, claiming that they are having audio or video problems (a common occurrence for remote workers) and then sending instructions via message or email to send confidential information or a wire transfer. These transfers are generally immediately placed into crypto wallets and moved around, making recovery of the funds incredibly difficult.

How to recognize malicious emails?

Sundaresan Kanappan: Some important signs end-users can look out for include: 

a. Inconsistencies in email addresses, URLs, and company domains: It is always important to be able to verify whether an email is actually from its apparent sender. Inconsistencies include email addresses that are different from the name on the account and domain names that are similar but not exactly the same.

b. Request for personal information: Most legitimate organizations will never ask for your personal information via the internet. For example, if an email supposedly from your bank asks for your bank account number, it should definitely raise a red flag.

c. Suspicious attachments: Even if an attachment is from a seemly trustworthy source, it is prudent to check the attachment or not to open the file if it seems suspicious. This is since malicious code or programmes can be embedded into attachments and installed once they are opened. 

d. Poor grammar: Some phishing attacks tend to originate from foreign countries where English is not the first language. Hence, keep a lookout for grammatical errors. 

Email security

Is the Application’s built-in security enough to tackle the security threats via email?

Sundaresan Kanappan: Traditional email security solutions tend to work on the outside by changing the Mail Exchanger record (MX record) and using technologies such as antivirus protection, data encryption, and spam filters to create a protective boundary around your inbox to not let any malware come through. 

Built-in security needs to be absolutely robust to deal with security threats via email. Given this scenario, Tech Data recently strengthened its security portfolio in partnership with MailGuard – a world leader in email security. This partnership allows Tech Data to add MailGuard 365 — a solution built by MailGuard in collaboration with the Microsoft team that is integrated natively in Azure, to protect the more than 345 million Microsoft 365 subscribers — to its cyber security go-to-market portfolio in the Asia Pacific and Japan region.

A world-first evolutionary approach, MailGuard 365 is the last email security engine, designed to target and stop email threats by re-scanning inbound emails after the Microsoft 365 security stack (including Microsoft Defender) has done its security threat assessment. 

How should organizations manage email security?

Sundaresan Kanappan: Adopting a multi-layered approach to email security is ideal. No single vendor can defend against every threat. If a business is using Microsoft 365, even with Defender, or Google Workspace, they should still deploy an additional specialist layer of email security to enhance their protection. Industry experts refer to it as a ‘defense-in-depth’ approach, and it’s what motivated MailGuard to co-build MailGuard 365 in collaboration with Microsoft engineers. Speed to detect and stop new threats is vital, and MailGuard 365 is up to 48 hours faster at blocking emerging zero-day threats. 

Additionally, businesses must take a holistic approach to their email security, like considering password management and best practices such as mandating multi-factor authentication and investing in cyber awareness training for their workforce.  

Please tell me about the recent Tech Data – MailGuard partnership.

Sundaresan Kanappan: With this partnership, Tech Data aims to support MailGuard in further strengthening its presence across the Asia Pacific (APAC) market. This will be realized through Tech Data’s capabilities and reach across the diverse APAC region. MailGuard365: MailGuard’s Integrated Cloud Email Security (ICES) solution will now be exclusively available in 6 countries across the APAC region: Hong Kong, India, Indonesia, Malaysia, Singapore, and Vietnam.

MailGuard365 is native to Microsoft, allowing Microsoft customers to activate MailGuard 365 from within Microsoft itself. Given that Tech Data is an indirect Microsoft CSP, this is another reason why MailGuard chose to partner with us. A solution like MailGuard365 also aligns with our holistic approach to cyber security and strengthens Tech Data’s cloud security and cybersecurity portfolios. 

How does Tech Data manage security across its offerings, including cloud services?

Sundaresan Kanappan: Tech Data’s partnerships with the world’s leading cloud security-as-a-service vendors ensure that our partners are able to provide their clients with industry-leading cybersecurity that features the most up-to-date and thorough services. This enables our partners to deliver cloud-based products for businesses of all sizes and needs, whether it is endpoints, email, or web protection.

Our extensive cloud services portfolio enables channel partners to assess, migrate, optimize, and manage customer workloads and applications to accelerate their transformation and modernize their IT environments. Tech Data works hand-in-hand with partners to provide the necessary level of expertise to support end-users in maximizing the benefits of cloud computing.

Our partnership with MailGuard is in line with Tech Data’s overall strategy of empowering Independent Software Vendors (ISVs) and other partners. ISVs, in particular, have intellectual property and vertical market solutions, which may require MailGuard 365-type embedded email security solutions. 

The inclusion of MailGuard into our portfolio also enables partners, especially those who are selling Microsoft, to drive better yields and generate higher revenue with existing customers. 

END.

Also Read: The Emergence of Spyware, Zero Click Attacks, Smishing, and Store Security

Deepa Sharma

Deepa Sharma

Senior Writer and Editor at CXO VOICE, She covers technology, cybersecurity, and financial and other tech news and updates. She can be reached at "deepa@cxovoice.com"

Related Posts

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain
Business

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain

March 28, 2023
Cybersecurity While Working from Home amid Coronavirus outbreak
Cyber Security

Hackers targeted Google, Microsoft products via zero-day exploitation in 2022: Report

March 22, 2023
Microsoft CBSE quention paper
Business

Microsoft to build its own mobile games store for iOs and Android

March 20, 2023
smart home security camera
News

Smart home security camera market grew by 44% in 2022

March 17, 2023
Samsung to invest $230 bn on five advanced chip plants
Business

Samsung to invest $230 bn to build mega chip cluster near Seoul

March 15, 2023
AI chatbots
Cyber Security

Avoid AI chatbots that don’t appear on the company’s website or app: warn researchers

March 14, 2023
MediaTek
News

MediaTek may soon launch an updated version of ‘Dimensity 9200’

March 13, 2023
Lenovo Next-gen desktop
News

Lenovo announces next-gen desktop workstations in India

March 10, 2023
Load More
ADVERTISEMENT

Expert Views

SaaS Rising: India is Ready for its Next IT Moment
Opinion

SaaS Rising: India is Ready for its Next IT Moment

January 31, 2023
Technology remains the main driver for insurance companies to scale and grow in 2023
News

Technology remains the main driver for insurance companies to scale and grow in 2023

January 10, 2023
Supply Chain Attacks – The Open Source Effect
Cyber Security

Supply Chain Attacks – The Open Source Effect

January 3, 2023
Technology Trends to Watch in 2023
Opinion

Top Technology Trends to Watch in 2023

December 21, 2022
Startups should embrace a down-round and restructure their firms: Flipkart CEO
Business

Startups should embrace a down-round and restructure their firms: Flipkart CEO

November 22, 2022

Latest Updates

PwC India partners with actyv.ai to scale embedded finance in supply chain ecosystems

PwC India partners with actyv.ai to scale embedded finance in supply chain ecosystems

by News Desk
9 mins ago

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain

AI-driven B2B marketplace Fashinza raises $30 mn to enhance supply chain

by IANS
23 hours ago

SUN Mobility and Zomato collaborate to power 50K electric 2-wheelers for food delivery

SUN Mobility and Zomato collaborate to power 50K electric 2-wheelers for food delivery

by IANS
2 days ago

Will never share US user data with China, says TikTok CEO

TikTok CEO says, will never share US user data with China

by IANS
5 days ago

China's smartwatch shipments declined by 9.3% in 2022: Report

China’s smartwatch shipments declined by 9.3% in 2022: Report

by IANS
6 days ago

Hybrid workplace

78% of professionals heading back to the office by choice

by IANS
6 days ago

Get Latest Update

Subscribe to our mailing list to receives newsletter direct to your inbox!

ADVERTISEMENT

Leaders Inerviews

Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain
Cyber Security

Rising cyber attacks pose a serious threat to Indian SMBs, says Zakir Hussain

-
Axis Bank's Cloud-driven digital banking solutions
Banking

Axis Bank doubles down on cloud based digital banking solutions

-
digital-first strategy
Banking

Jana Small Finance Bank’s digital-first strategy enhances customer experience

-
email security interview
Cyber Security

What is email security? and its importance in securing enterprise networks

-

Entrepreneur

Samsung Electronics appoints its first female president

Inspiring Women Entrepreneurs in India (2022)

Technology Adoption For Entrepreneurs

Volunteering management is the need of the Hour

We bring business leaders' opinions and unique ideas on what’s happening in the market and its impact. Also, get the daily news, analysis, and insights.

Connect with us

Easy Links

  • Cryptocurrency
  • Event
  • Blockchain
  • Press Release
  • Resources & Downloads

Write Us

contact@cxovoice.com
  • Home
  • About
  • Contact Us
  • Advertise
  • Privacy & Policy
  • Feedback

© 2023 CXO VOICE

No Result
View All Result
  • Home
  • News
  • Expert Opinion
  • Leaders Talk

© 2023 CXO VOICE

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Our Spring Sale Has Started

You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/