Hosted Exchange services provide reliable security in the face of ever-present threats to business email systems. With so much business and personal correspondence passing through inboxes, email continues to be highly targeted by cyber criminals. Several sophisticated threats recently uncovered by web security professionals serve as a reminder of the potential risks of corporate email.
Hosted Exchange services help target the common thread in many email-based cyber-security issues – less-than-perfect user activity. The ubiquity of email can breed complacency and cause businesses to relax their guard. At the same time, convenience and productivity are high priorities in corporate environments, so affixing cumbersome safeguards to email usage is objectionable. Hosted Exchange services provide a best-in-class combination of tough security and user convenience.
Hosted Exchange services: avoiding attacks
The best way to avoid email-based attacks is to keep harmful email from reaching users’ inboxes, often a tough task. Threats target both corporate and personal email activity, which is often conducted on the same device connected to the company network. The recent data breach foisted on Target, which exposed credit card and personal information of more than 110 million consumers, was sprung with the help of an email phishing attack that targeted an HVAC company that conducted business with the retailer, according to Krebs on Security.
Hosted Exchange services also use smart spam filtering tactics to target malicious messages and excise them from the incoming email stream. Hackers often attempt to use a popular news story to cloak their nefarious intent, hoping that a seemingly personal message, combined with the popular item, can pique a user’s interest and cause him or her to click before thinking. This is what happened in the wake of actor Paul Walker’s death in a November car accident, according to Symantec.
Many people received emails asking for help locating the driver of another car that could be connected to the crash that caused Walker’s death, promising reimbursement for any information. A file is attached to the message – represented as a photo of the wanted driver – but it actually contains an executable file. This file is a Trojan Horse virus which instructs the computer to download additional malware in the background without the user’s knowledge. The Trojan Horse also harvests the contents of inboxes and address books of compromised computers, so it can continue to propagate itself to other targets.
Hosted Exchange services help establish blockades at all the points hackers would use to inflict spam or malware on the system. Network safeguards make hosted Exchange services ideal for establishing a strong defense against the daily perils of email cyber threats.