Emerging threats: What’s next in email security?

The role of the internet has surged through digital transformation, revolutionising communication, commerce, and connectivity. It has reshaped industries by enabling remote work, e-commerce, and cloud services. While the omnipresence of the internet is propelling economies by redefining how we operate, information dissemination and global networking through the internet are fostering collaboration and innovation. In the present day, the internet has become a crucial component for information exchange, with email playing a pivotal role in facilitating communication.

Email remains a cornerstone of digital communication, offering swift, reliable, and versatile correspondence globally. According to a recent cybersecurity report by Hornetsecurity, there was a 144% increase in email attacks. Phishing increased by nearly 4% this year, rising from 39.6% to 43.3% of all email attacks. With encrypted options ensuring security, email serves as a formal conduit for business exchanges and a personal touchpoint for connecting worldwide. Despite evolving platforms, its adaptability and familiarity persist, underscoring email’s enduring significance in modern communication landscapes.

However, as reliance on digital communication grows, hackers exploit human error using sophisticated tactics, heightening email’s vulnerability to attacks. According to a survey from Cloudflare, ‘Securing the Future: Asia Pacific Cybersecurity Readiness Survey,’ respondents cited data/IP loss (20%), reputational damage (15%), and a loss or reduction of customers (12%) as some of the biggest losses generated through such attacks. Exploiting trust, these emails steal credentials, financial information, or install malware, compromising valuable systems and data. Robust cybersecurity measures and user awareness are crucial to mitigate these evolving risks.

Techniques that are majorly being used by attackers to steal information

Breaches can lead to the loss of sensitive data, compromising confidentiality and damaging trust. Cyber attackers are always on a look out for new techniques in order to breach cybersecurity. Some of the common techniques found among these attackers include phishing attacks, email spoofing and social engineering tactics, and business email compromise (BEC) among others.

Phishing attacks – Cyber attackers employ phishing emails to deceive workers into sharing sensitive details like logins, financial data, or personal information. Phishing, like any type of cyber attack, exploits the weakest link. However, unlike many other attacks, phishing exploits human behavior rather than technical vulnerabilities. Whether you are booking a trip, responding to a Zoom invite, or simply checking email — everyone online is a target. The Cloudflare survey also found that phishing attacks are one of the biggest cause of cybersecurity incidents in India

Email spoofing and social engineering tactics – Cyber criminals utilise email spoofing to mimic a trusted source and deceive targeted individuals into sharing sensitive data or engaging in harmful activities. Social engineering employs psychological manipulation to trick people into revealing confidential information or clicking on malicious links.

Business email compromise (BEC) – BEC attacks occur when cybercriminals infiltrate a valid account and pose as a reputable entity, like a vendor or company executive, aiming to acquire sensitive data or execute deceitful transactions. These attacks are pinpointed and often tough to spot, leading to substantial financial repercussions.

Emerging trends in email security

As attackers keep looking for newer techniques, some of the most common trends involve advanced threat protection, zero trust email security, and enhanced authentication mechanisms.

Advanced threat protection – Traditional antivirus and spam filters are no longer effective enough. Contemporary email security solutions leverage machine learning and artificial intelligence to identify and prevent sophisticated threats like phishing, spear-phishing, and BEC attacks. These technologies assess email content, sender actions, and contextual cues to pinpoint suspicious behaviors.

Zero trust email security – The zero trust security model has become prominent in email security, operating on the premise that neither internal nor external entities should be automatically trusted. Even if a message has passed email authentication, it should not be inherently trusted. Instead, preventing a potential phishing attack requires a zero trust security model that ensures all user traffic is verified, filtered, inspected, and isolated from internet threats.

Anjali Amar
Vice President & Country Head India SAARC
Cloudflare



Enhanced authentication mechanisms – Multi-Factor Authentication (MFA) is growing in significance within email security. It provides an additional authentication layer, heightening the challenge for unauthorised individuals attempting to access email accounts. Alongside conventional MFA, email security now integrates adaptive authentication, assessing risk elements to decide when extra authentication measures are necessary. Cloudflare Zero Trust offers a holistic defense against phishing threats through a multifaceted approach. It seamlessly integrates cloud email security with remote browser isolation (RBI), automatically isolating suspicious email links.

In safeguarding both personal and business communication, it is imperative to stay ahead of these evolving threats by implementing robust cybersecurity measures, fostering user awareness, and embracing cutting-edge technologies.

Disclaimer: The views expressed in this article are those of the author and do not necessarily reflect the views of ET Edge Insights, its management, or its members

Scroll to Top