|By Business Wire||
|August 21, 2014 07:02 AM EDT||
The Q2 Email TrustIndex covers the period from April through June 2014 and provides email “threat” ratings, or the volume of cyberthreats targeted towards any given company’s consumers via email, and email “trust” ratings, or how well companies are protecting consumers from email cyberthreats. To compile the Index, Agari analyzes 6.5 billion emails per day across 11 industries to identify which companies are being targeted and which companies are taking action to prevent attacks from reaching consumers.
The Travel sector saw threat volume increase by 800% in Q2, signifying a major target for hackers. Mega Banks were found to have the highest ThreatScore in Q2, where consumers are 15 times more likely to receive a malicious email pretending to be from a major bank than they are from an airline. Health Care is still in critical condition with the lowest TrustScore of all industries. Out of the 14 health care companies analyzed, 13 classified as "easy targets" for cybercriminals.
“Quarter after quarter we are witnessing industries struggle with email security. We see countless high-profile breaches in the news where email is a stepping stone in the attack or is leveraged post-attack to steal credentials, begging the question, ‘Why are these industries not protecting themselves and their customers?’” said Patrick Peterson, Founder and CEO of Agari. “We issue these quarterly reports to encourage people to take email security more seriously. For a long time, brands couldn’t do anything to stop brand hijacking, but now they can deploy DMARC to stop brand abuse through email and protect their consumers.”
Email is the Weakest Link
The disparity in email security between the best- and the worst-performing industries is significant: of the industries surveyed, three-quarters have yet to completely implement DMARC (Domain-based Message Authentication, Reporting, & Conformance), an open standard enabled on 70% of the world’s inboxes. DMARC is the only security solution that enables Internet-scale email protection and prevents fraudulent brand abuse for email-borne cyberattacks. Social companies have a 64% DMARC implementation rate – five times what has occurred among airlines.
Despite the importance, ubiquity and staying power of email, there are still flaws. According to the Identity Theft Resource Center, as of July there have been 395 data breaches in the U.S. alone; a 21 percent increase from the same time in 2013. In Q2 2014, Agari witnessed a rise in the number and threat-level of malicious email attacks from many of the security incidents making headlines. Cryptolocker, GameOver Zeus and the recent hacking of 1 billion passwords by a Russian gang all involve security gaps from email.
Additional Key Findings in Q2:
Financial Services was broken down into Payments, Mega Banks
(US and Europe), and Large Banks in Q2.
- Large Banks are the least trustworthy financial institution. Every large bank evaluated was classified as an “easy target.”
- E-tailers are excelling in email security, with online-only pioneers, such as Netflix and Newegg, leading the pack, whereas the majority of retailers are lagging in implementing best practices.
- Social Media sites are "security rockstars" with Facebook, Google+, LinkedIn and Twitter having near-perfect TrustScores.
About the Agari TrustIndex
The Agari TrustIndex contains ratings developed by Agari that reflects how fully organizations have deployed three standards (SPF, DKIM, and DMARC) across their primary active domains. While all three standards are deployed "behind the scenes" and are not directly visible to consumers in most cases, by looking at TrustIndex scores you can get a simple, easy to understand rating of how well any given organization is protecting their customers from receiving malicious email under the guise of the organization's brand and domain name. It's important to note that the Agari TrustScore reflects that level of security deployed by the organization, and is not directly related to the ThreatScore, which is an indicator of how high a level of attack is directed at an organization. A company could have a very high TrustIndex score and still have a high ThreatScore as well, as even though they've deployed effective security the bad guys are still trying to break in.
The latest copy of the Agari Email TrustIndex is available for download here.
RELATED LINKS AND CONVERSATIONS
- Agari Email TrustIndex
- Learn how Agari makes email safe
- Agari DMARC Overview
- Visit our resource library for the latest whitepapers, how-to guides and case studies
- Follow Agari on our blog, Twitter, LinkedIn, and Facebook
Agari builds new, Internet scale, data driven security solutions that eliminate email as a channel for cyberattacks and enable businesses and consumers to interact safely. The Agari cloud-based SaaS solution aggregates data from 2.5 billion mailboxes to help global brands eliminate email threats, protect customers and their personal data, and proactively guard brand reputation. Today, Agari analyzes over 6 billion messages per day, identifies over 2 million malicious URLs per month, and blocks over 200 million malicious emails per month. Founded by the thought leaders behind Cisco’s IronPort solutions, Agari, a recipient of the JPMorgan Chase Hall of Innovation Award and recognized as a Gartner Cool Vendor in Security, is headquartered in Silicon Valley. Learn more at http://www.agari.com.
"We are a modern development application platform and we have a suite of products that allow you to application release automation, we do version control, and we do application life cycle management," explained Flint Brenton, CEO of CollabNet, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 09:15 AM EST Reads: 681
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Dec. 3, 2016 09:00 AM EST Reads: 435
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 08:30 AM EST Reads: 471
Application transformation and DevOps practices are two sides of the same coin. Enterprises that want to capture value faster, need to deliver value faster – time value of money principle. To do that enterprises need to build cloud-native apps as microservices by empowering teams to build, ship, and run in production. In his session at @DevOpsSummit at 19th Cloud Expo, Neil Gehani, senior product manager at HPE, discussed what every business should plan for how to structure their teams to delive...
Dec. 3, 2016 08:30 AM EST Reads: 1,344
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
Dec. 3, 2016 08:30 AM EST Reads: 677
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 07:30 AM EST Reads: 696
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 07:00 AM EST Reads: 505
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 3, 2016 06:30 AM EST Reads: 6,000
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Dec. 3, 2016 05:45 AM EST Reads: 6,918
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
Dec. 3, 2016 05:30 AM EST Reads: 1,198
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Dec. 3, 2016 04:15 AM EST Reads: 3,423
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 3, 2016 04:15 AM EST Reads: 1,713
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, will share examples from a wide range of industries – includin...
Dec. 3, 2016 02:30 AM EST Reads: 1,523
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 3, 2016 02:15 AM EST Reads: 1,498
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Phil Hombledal, Solution Architect at CollabNet, discussed how customers are able to achieve a level of transparency that e...
Dec. 3, 2016 02:15 AM EST Reads: 757