Personal email:Pathway to Cybersecurity Breaches

EITAGlobal and Cloud Expert Kevin L. Jackson Team To Deliver Business Focused Cloud Computing Training

By G C Network | December 9, 2013

Today I am announcing my partnership with EITAGlobal to produce and deliver a series of business focused training webinars on cloud computing. Headquartered in Fremont, California, EITAGlobal is a continuing professional…

NRRC Video Series – Video 6 : Telos Demonstrates Cloud-based Communications System

By G C Network | December 8, 2013

In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration. Sponsored by the National Geospatial-Intelligence Agency, this demonstration showed how an interoperable, hybrid-cloud operating environment can be quickly enabled…

NRRC Video Series – Video 5 : Boeing Ozone Dashboards for Emergency Management

By G C Network | December 7, 2013

In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration. Sponsored by the National Geospatial-Intelligence Agency, this demonstration showed how an interoperable, hybrid-cloud operating environment can be quickly enabled…

Proud To Be Joining Veterans 360 and Cloud for Vets!

By G C Network | December 5, 2013

Today I’m proud and honored to announce my appointment to the Board of Advisors for Veterans 360. Their mission is to provide young, recently-separated combat veterans with a program of…

Take Charge, Lead Change, Do Cloud Right!

By G C Network | December 4, 2013

The theme for next week’s Gartner Data Center conference, “Taking Charge, Leading Change — Your I&O Transformation Can’t Wait”, is a real wake up call for today’s I&O leaders. Gartner’s…

Cloud Computing at the Potomac Officer’s Club

By G C Network | November 27, 2013

Across the Federal IT landscape, terms like “cloud”, “cloud computing” and Software as a service (SaaS) are at the center of a seismic shift by the agencies away from building…

NRRC Video Series – Video 2 : Building the Cloud Infrastructure

By G C Network | November 26, 2013

In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration.  Sponsored by the National Geospatial-Intelligence Agency, this demonstration showed how an interoperable, hybrid-cloud operating environment can be quickly enabled…

NRRC Video Series – Video 1 : Introduction and Overview

By G C Network | November 25, 2013

In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration.  Sponsored by the National Geospatial-Intelligence Agency, this demonstration showed how an interoperable, hybrid-cloud operating environment can be quickly enabled…

NCOIC To Rollout Open Process for Creating Secure, Hybrid IT Computing Environments

By G C Network | November 20, 2013

Network Centric Operations Industry Consortium to offer capability to organizations that seek to combine traditional and cloud infrastructures for greater efficiency and mission success WASHINGTON-November 19, 2013-Next month, the Network…

So what kind of consultant are you?

By G C Network | November 15, 2013

Yesterday over lunch, a good friend of mine from the Limelight Marketing Group and I started talking about my recent transition. As you can imagine being in the DC metro…

As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems commissioned online survey of 400 U.S. white-collar, adult workers, more than 90 percent of them admitted checking personal emails at work. The workers questioned in the poll estimated they spend 6.3 hours a day checking emails, with 3.2 hours devoted to work emails and 3.1 hours to personal messages. Nearly half of the respondents also said that their use of emails for work will increase in coming years with 19 percent saying it will go up substantially.

Employers generally have the discretion to monitor and restrict employees’ personal computer usage as they see fit and, in most cases, email messages are not subject to any personal privacy laws. But even with these stipulations, Dell SonicWall channel partner Michael Crean, President and CEO of Solutions Granted, says that allowing personal email on corporate PCs is just not worth the risk. Solutions Granted, a small veteran-owned business, is certified as a SonicWALL Managed Security Service Provider. According to Crean, the threat of malicious attacks and subsequent remediation cost far outweighs any gain from allowing personal email access. “If your employees need to check their email in the car, they use their personal phone. So why can’t they do the same at work?”

Email phishing, the attempt to acquire sensitive information for malicious reasons by masquerading as a trustworthy entity, is a significant cybersecurity threat.

“In one incident investigated by Dell SecureWorks, attackers phished an employee at a manufacturing company to obtain the login credentials for the company’s Citrix platform. The attackers were able to use the credentials to connect to internal corporate resources, then move laterally through the network and harvest intellectual property using the company’s Altris platform, which remotely distributes new software and patches to all the endpoints.”

The most sophisticated attacks are grouped in two categories:

  • Indirect Phishing Attacks –attackers direct a series of emails, usually in combination with organizational information from other sources such as LinkedIn, that add up to a successful phishing campaign. An example would be an employee being tricked into giving away Yahoo credentials as part of an attack, which can give access to contact or calendar information. Another example would be an employee with a cloud-based company email (i.e. Office 365 or Gmail for Business accounts) could be successfully phished. This could give the attacker a platform for sending malicious emails that appear safe.
  • Direct Phishing Attacks – Cybercriminals seek login credentials for actual business systems. During Q2 2015 security analysts found multiple examples of phishing attempts on Outlook credentials. Aside from email access, these credentials are frequently used for domain logins, providing an attacker with access to other cloud-based services, such as Dropbox or Salesforce. This sort of breech could also provide an attacker with direct access to corporate proprietary information.

Phishing is often described as spam and, according to Secure List, generally followed the same template:

  • Very little text (the email generally contains a typical header consisting of several words which is exactly repeated in the body of the message)
  • One or more links which load a brightly decorated picture (sometimes in parts) with all the necessary advertising data (a more detailed advertising text plus contacts: website address, phone number, company name)
  • Another long link that leads to a resource that corresponds to the content of the email
  • Additional ‘white noise’ text to bulk out the email

The white noise text consists of random phrases or single words in any language which may not be the same as the language of the mass mailing. This text is generally invisible to the reader of as it is written in white or pale color on a standard white background.  Email is also often used to distribute malicious attachments in Microsoft Word or Excel.

Phishing is an equal opportunity threat with “Global Internet Portals”, which include email and search portals taking the brunt of the attacks. As a trusted advisor to their customers, Solutions Granted recommends the following:

  • Severely restrict or eliminate employee access to personal email via company-owned assets;
  • Don’t let preferences of your human resources team overrule the need for IT security; and
  • Use industry proven cybersecurity technologies and best practices.

This post was written as part of the Dell Insight Partners program, which provides news and analysis about the evolving world of tech. Dell sponsored this article, but the opinions are my own and don’t necessarily represent Dell’s positions or strategies.

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network