Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Human Firewall: Why People Are Critical To Email Security
Newest First  |  Oldest First  |  Threaded View
Maisons pierre
50%
50%
Maisons pierre,
User Rank: Apprentice
3/15/2017 | 12:53:42 PM
Virus
Like my developper says, the virus is always between the chair and the screen, YOU ! People need to be educated more and more about phishing for exemple.
Lily652
100%
0%
Lily652,
User Rank: Moderator
12/11/2016 | 1:08:35 PM
prayer times

It was a very good post indeed. I thoroughly enjoyed reading it in my lunch time. Will surely come and visit this blog more often. Thanks for sharing 

RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
12/2/2016 | 3:29:31 PM
Why So Lax?
I'm ever confused regarding the need for complex email workflows and processes in the workplace.  It should be a no-brainer when it comes to companies that have even the slightest belief their email servers and network could be compromised by the accessing of certain types of email by their users.  First of all, lock it down.  There are two primary ways to utilize email in the workplace:  1) You need to email each other (employees) to get work done.  This is internal.  So, build an internal secure network for your email servers and, viola, the only spam or malicious code you'll get via email will be those crafted by your employees at work and intentionally sent.  This type of email system never gets exposed to the outside world.  2) You need to email out to or receive in from non-employees (vendors, etc).  Use a secure email system where a 3rd party encrypted application is used that a) removes any possibility of outside emails that contain spam or malware (again, unless crafted by your employees or vendors at work and intentionally sent), and b) keeps your communication intentional, private and meaningful.

The arguments against this I often hear relate to ease-of-use or expense.  Well, there are plenty of FOSS (Free and Open Source) solutions out there, so expense (other than that of obtaining resources to build, install, train and maintain) is not an argument when weighed against the expense of becoming a victim of spam, phishing, malware and so forth.  And ease-of-use means what?  So I have to log into an app to send an email to only receipients that I'm allowed to send it to.  I'm at work.  This is a problem?

OK, I sometimes oversimplify but to be honest it is when you oversimplify that the real questions that should be asked are.  Companies do not do business to satisfy the whims of employees; my company's technology infrastructure does not exist so I can surf the web, email my wife about next week's party plans, or receive coupons and evites that may or may not be from trusted sources.

Why so lax?


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23691
PUBLISHED: 2021-05-14
YFCMF v2.3.1 has a Remote Command Execution (RCE) vulnerability in the index.php.
CVE-2020-18166
PUBLISHED: 2021-05-14
Unrestricted File Upload in LAOBANCMS v2.0 allows remote attackers to upload arbitrary files by attaching a file with a ".jpg.php" extension to the component "admin/wenjian.php?wj=../templets/pc".
CVE-2020-18167
PUBLISHED: 2021-05-14
Cross Site Scripting (XSS) in LAOBANCMS v2.0 allows remote attackers to execute arbitrary code by injecting commands into the "Homepage Introduction" field of component "admin/info.php?shuyu".
CVE-2020-23689
PUBLISHED: 2021-05-14
In YFCMF v2.3.1, there is a stored XSS vulnerability in the comments section of the news page.
CVE-2021-25941
PUBLISHED: 2021-05-14
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.