European firms adopting automated email analysis solutions to deter phishing attacks
March 28, 2018
A majority of organisations across Europe are looking to adopt automated email analysis solutions to respond to phishing emails even though 78 percent of IT professionals in Europe have dealt with email-based security incidents in the past.
A massive shortage of cyber security professionals is now forcing European organisations to adopt integrated and automated email analysis solutions as there simply aren't enough IT personnel to analyse every email.
A survey conducted by the firm revealed that cyber security professionals employed by enterprises across Europe are more experienced in dealing with email-based security threats compared to their U.S. counterparts. 78 percent of IT professionals in Europe have dealt with a security incident originating from a deceptive email compared to just 66 percent in the US.
Greater demand for automated solutions
Despite this advantage in terms of experience, 59 percent of organisations across Europe are looking to adopt automated email analysis solutions compared to just 33 percent in the United States. Aside from fixing the existing skills gap, the new solutions are also expected to replace poorly integrated security systems that often fail to detect email-based security threats.
"With organisations of all sizes struggling to find IT talent and particularly cyber security skills, perhaps the need for an automated and integrated system to deal with suspicious emails is being felt more acutely in Europe," the report noted.
The need is much more pronounced in the UK where, according to Cofense, 23 percent report more than 500 suspicious emails each week, compared to 16 percent in Belgium and 18 percent in Germany.
"What we're really looking at here is addressing human susceptibility and building human resiliency to work in concert with technology to combat security threats facing Europe," said Rohyt Belani, co-founder and CEO of Cofense.
"Technology solutions alone have proved time and time again that they can only go so far to protect enterprises. It is not enough to lock down systems and force users into acting a certain way, instead we need to build a human-driven phishing defence posture that leverages human instinct for detection and technology to scale response," he added.
This isn't the first time that the need for automated solutions to replace humans has been voiced by IT professionals. Last year, several reports had revealed how employees at many organisations failed to patch their systems in a timely manner even though patches were made available by software vendors.
To respond to the issue, Oracle launched a new database named Oracle 18c which could patch cyber security flaws on its own without having to schedule a downtime. Costing less than half than Amazon's Redshift, Oracle said the database will not only be able to handle more workload because of its ability to increase the number of active processors but will also be able to patch existing cyber security flaws during runtime.
In short, enterprises using the new database will not have to schedule downtimes to update it or to download new patches to fix existing security issues, thereby utilising the database more efficiently. Oracle's CEO Larry Ellison said that the automated database will be able to perform operations 99.95% of the time, which means that any unplanned downtime will not take more than 30 minutes in an entire year.
Jay Jay is a freelance technology writer for teiss. He has previously written news articles, device reviews and features for Mobile Choice UK website and magazine, as well as writing extensively for SC Magazine UK, Tech Radar, Indian Express, and Android Headlines.
A security researcher has discovered a publicly indexed MongoDB database hosted on Amazon AWS infrastructure that contained over 275 million records with personal identifiable information (PII) on Indian citizens but …
Security researchers have uncovered a malicious email campaign that distributed the Dridex banking trojan using phishing emails and by using compromised FTP sites instead of HTTP links. The email campaign …