SlideShare ist ein Scribd-Unternehmen logo
1 von 66
The Hidden Security Danger –
Don’t Let Email Be Your Downfall
Justin Pirie
@justinpirie
blog.mimecast.com
jpirie@mimecast.com
Infosecurity Europe
April 19th 2011
nccarf_au
Analyst Blogger
Community Manager
Where I work
tipiro
Cloud Services for Microsoft Exchange
matthewbradley
Email Security
neilalderney123
Email Continuity
dolescum
Email Archive
How the problem used to be solved...
minifig
What do users get?
mescon
Unlimited Storage
Ronan_C
Fast Search
szeke
Uptime
Over 900,000 users can’t be wrong!
LIVING_BY_THE_MOMENT
How did it all start?
Daniel Mohr
Why are they using personal email?
ScottMJones
WHY?
Generation
Why Does it Matter?
jayhem
Up to 80% of Corporate IP is in email
msmail
Fancy losing your secrets?
Personal Email:
Data Protection and Sovereignty
Personal Email:
Anti-Malware Requirements?
twenty_questions
Personal Email: Password Policy?
Bruno Santos
dolescum
Personal Email: Retention and Audit?
Personal Email: Legal Requirements?
most uncool
Personal Email: Data Leak Prevention?
just.Luc
Personal Email: Interception?
hukuzatuna
Brad Stabler
Errrr… No!
Nightmare…
Jonas Tana
ScottMJones
WHY? Consumerisation of Technology
Same time: Personal / Work Tech
Converging
Kevan
Email is dead.
Facebook COO Sheryl Sandberg
June 2010
David Reece
Communication is Changing
Easier AND More Important
DailyPic
What Makes Us Productive At Home:
Users Want At Work
Anirudh Koul
Carrick
Has Corporate Email Kept Up?
Email is not dead!
Sarcasmo
2003: Zuckerburg still in College
Pernell
Who has a smartphone?
John.Karakatsanis
Who has a smartphone for work?
ilamont.com
What about Work email on a Smartphone?
So who uses personal email for work?
85% of Under 25’s Use Personal Email for Work
Leo Reynolds
1 in 5 in a regular basis
crowt59
confidence, comely.
Research: On average people have 3 email accounts
66% Say email is preferred work
communication
Leo Reynolds
bartmaguire
36% of Work email is Personal
79% Send work emails from personal
accounts
Cameron Maddux
There’s a disconnect
cthoyes
Daniel Mohr
Why are they using personal email?
mescon
Webmail: Storage is unlimited
Corporate Email: Small and Limited
leonorjr
56% Have Corporate Mailbox Frustrations
_4cryingoutloud
funkypancake
To remain Flexible and Productive: Workaround
I don’t think we can ignore this problem
dmoola
IT’s Struggle: Empowerment or Control
Rusty Stewart
Jonno Witts
The Perimeter is gone
"The more you tighten your grip… the
more star systems will slip through your
fingers.” -- Princess Leia
Can’t control users anymore:
They must want to use corporate IT
J+B=Us
What can we do TODAY?
margolove
mescon
Offload storage to the Cloud: Unlimited
a_sorense
Research Agrees: 40% less likely to Workaround
szeke
Uptime: 86% Consider it essential
Take Continuity to the Cloud
hushed_lavinia
Thanks!
Feel free to contact me:
Justin Pirie
@justinpirie
blog.mimecast.com
jpirie@mimecast.com
Infosecurity Europe
April 19th 2011
nccarf_au

Weitere ähnliche Inhalte

Ähnlich wie The Hidden Security Danger – Don’t Let Email Be Your Downfall

ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 Thycotic
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet securityMostafa Siraj
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Wrike
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Cristina Collado
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat ReportChris Hewitt
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Xola Adons
 
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...Xenium HR
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying Karthik Kumar
 
Scaling & automating b2 b leadgen & marketing from newbie to billion ...
Scaling & automating b2 b leadgen & marketing from newbie to billion ...Scaling & automating b2 b leadgen & marketing from newbie to billion ...
Scaling & automating b2 b leadgen & marketing from newbie to billion ...Akshat Kharbanda
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 

Ähnlich wie The Hidden Security Danger – Don’t Let Email Be Your Downfall (20)

ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018 World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
 
Personal internet security
Personal internet securityPersonal internet security
Personal internet security
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!Email Is Dead... Long Live Email!
Email Is Dead... Long Live Email!
 
Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?Data breaches - How well is your organization protected against them?
Data breaches - How well is your organization protected against them?
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
Mimecast Threat Report
Mimecast Threat ReportMimecast Threat Report
Mimecast Threat Report
 
Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)Report_Business_Email_Threat_Report (1) (2) (1)
Report_Business_Email_Threat_Report (1) (2) (1)
 
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
How to Keep Your Business Data Secure Without Spending Time Worrying About a ...
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
cybersecurity and Bullying
cybersecurity and Bullying cybersecurity and Bullying
cybersecurity and Bullying
 
Scaling & automating b2 b leadgen & marketing from newbie to billion ...
Scaling & automating b2 b leadgen & marketing from newbie to billion ...Scaling & automating b2 b leadgen & marketing from newbie to billion ...
Scaling & automating b2 b leadgen & marketing from newbie to billion ...
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Mehr von Justin Pirie

Unifying Devices in the Cloud
Unifying Devices in the CloudUnifying Devices in the Cloud
Unifying Devices in the CloudJustin Pirie
 
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudMicrosoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudJustin Pirie
 
The end of IT as we know it.
The end of IT as we know it.The end of IT as we know it.
The end of IT as we know it.Justin Pirie
 
CLT Law Conference Cloud intro
CLT Law Conference Cloud introCLT Law Conference Cloud intro
CLT Law Conference Cloud introJustin Pirie
 
Empowering and Securing BYOD Email
Empowering and Securing BYOD EmailEmpowering and Securing BYOD Email
Empowering and Securing BYOD EmailJustin Pirie
 
Copenhagen Lean Startup
Copenhagen Lean StartupCopenhagen Lean Startup
Copenhagen Lean StartupJustin Pirie
 
The Great Migration- Cloud Circle
The Great Migration- Cloud CircleThe Great Migration- Cloud Circle
The Great Migration- Cloud CircleJustin Pirie
 
Bristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupBristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupJustin Pirie
 
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...Justin Pirie
 
Microsoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionMicrosoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionJustin Pirie
 
Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Justin Pirie
 
Email: The Future Direction
Email: The Future DirectionEmail: The Future Direction
Email: The Future DirectionJustin Pirie
 
Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Justin Pirie
 
Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Justin Pirie
 
Lean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursLean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursJustin Pirie
 
Mimecast Partner Day
Mimecast Partner DayMimecast Partner Day
Mimecast Partner DayJustin Pirie
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud ConferenceJustin Pirie
 
Swindon- Talk on Cloud
Swindon- Talk on CloudSwindon- Talk on Cloud
Swindon- Talk on CloudJustin Pirie
 
Cloud: Space for the Channel?
Cloud: Space for the Channel?Cloud: Space for the Channel?
Cloud: Space for the Channel?Justin Pirie
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Justin Pirie
 

Mehr von Justin Pirie (20)

Unifying Devices in the Cloud
Unifying Devices in the CloudUnifying Devices in the Cloud
Unifying Devices in the Cloud
 
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell CloudMicrosoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
Microsoft Hosters Sweden- Becoming a Trusted Advisor to Sell Cloud
 
The end of IT as we know it.
The end of IT as we know it.The end of IT as we know it.
The end of IT as we know it.
 
CLT Law Conference Cloud intro
CLT Law Conference Cloud introCLT Law Conference Cloud intro
CLT Law Conference Cloud intro
 
Empowering and Securing BYOD Email
Empowering and Securing BYOD EmailEmpowering and Securing BYOD Email
Empowering and Securing BYOD Email
 
Copenhagen Lean Startup
Copenhagen Lean StartupCopenhagen Lean Startup
Copenhagen Lean Startup
 
The Great Migration- Cloud Circle
The Great Migration- Cloud CircleThe Great Migration- Cloud Circle
The Great Migration- Cloud Circle
 
Bristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean StartupBristol Tech Startup School: Lean Startup
Bristol Tech Startup School: Lean Startup
 
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
HostingCon 2011- How Not Just to Survive but Thrive in the Evolving Hosting M...
 
Microsoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference SessionMicrosoft Worldwide Partner Conference Session
Microsoft Worldwide Partner Conference Session
 
Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?Cloud- A Technical or Organisational Challenge? Or Both?
Cloud- A Technical or Organisational Challenge? Or Both?
 
Email: The Future Direction
Email: The Future DirectionEmail: The Future Direction
Email: The Future Direction
 
Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?Cloud and The Channel- Where's the space?
Cloud and The Channel- Where's the space?
 
Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?Cloud and the Channel- A Perfect Storm?
Cloud and the Channel- A Perfect Storm?
 
Lean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for EntrepreneursLean Startup - A Primer for Entrepreneurs
Lean Startup - A Primer for Entrepreneurs
 
Mimecast Partner Day
Mimecast Partner DayMimecast Partner Day
Mimecast Partner Day
 
CLT Legal Cloud Conference
CLT Legal Cloud ConferenceCLT Legal Cloud Conference
CLT Legal Cloud Conference
 
Swindon- Talk on Cloud
Swindon- Talk on CloudSwindon- Talk on Cloud
Swindon- Talk on Cloud
 
Cloud: Space for the Channel?
Cloud: Space for the Channel?Cloud: Space for the Channel?
Cloud: Space for the Channel?
 
Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?Cloud Security: Is My Data Safe?
Cloud Security: Is My Data Safe?
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

The Hidden Security Danger – Don’t Let Email Be Your Downfall

Hinweis der Redaktion

  1. Hi My name’s Justin Pirie I’m the Cloud Strategist here at Mimecast but I’m best known as an Analyst Blogger in the SaaS and Cloud space.
  2. Security
  3. Continutity
  4. Archive
  5. How did this all start? Last year we were speaking to some distinguished analysts in the email space and they had a hunch. A hunch that end users were using their personal email to work around corporate email systems.
  6. He believed this was because of growth of Social Networks and the blurring of Personal and Work technology. But he didn’t know. This is the guy that sets email strategy for most of the Fortune 1000.
  7. So we wanted to know WHY? Why are users using personal email? Why are they working around their Corporate email systems?
  8. Enter Generation Gmail. An independent survey and report by Loudhouse research comissioned by Mimecast into the usage of personal email for work.
  9. Before I deep dive into the report- I just want to set the context: Why does it matter? I don’t think I need to spell out the risks to a room full of infosec professionals, but please humor me!
  10. Over the years various analysts have estimated there is up to 80% of Corporate IP contained within email. Think of how you transfer files between colleagues. Hands up who sends files through email?
  11. Think about what that means: Client Details, Corporate Secrets and Infrastructure details. Not stuff you want to be losing.
  12. But beyond the obvious- Does personal email meet Data Protection and Data Sovereignty requirements?
  13. What about anti-malware requirements?
  14. Your Password Policy?
  15. Corporate retention and audit policies? Does it enable e-discovery?
  16. Legal requirements?- Corporate information VAT, Company No, Disclaimers etc
  17. Data Leak Prevention- PCI compliance, end point protection
  18. Prevent Interception- keyloggers and public access (wifi etc) http://www.flickr.com/photos/hukuzatuna/246057418/sizes/o/in/photostream/
  19. Of course not! It’s free consumer email. http://www.flickr.com/photos/bstabler/770416963/sizes/z/in/photostream/
  20. Nightmare! All the years and experience that goes into securing corporate email is going down the toilet!
  21. Why is this happening? I believe it is part of the broader context- the so called consumerisation of Technology.
  22. The infiltration of technology in our personal lives is now reversing back into our corporate lives. What’s interesting is that the research highlights that home and work technology overlaps for 65% of people. Certainly mine does. I want one inbox to deal with in my life. I hate SMS and Voicemail because they don’t get delivered to my email inbox.
  23. Yet at the same time people keep saying Email is dead. How do those facebook notifications get to your inbox I wonder?
  24. What is happening is a change in how people communicate.
  25. Communication is simultaneously becoming more important and easier.   It started with Text Messaging and Blackberries and is now Facebook and Twitter.
  26. What makes us productive at home we now want at work.
  27. But the problem for most corporates is that their email systems haven’t kept up with the rapidly changing pace of communications. Email hasn’t been a priority investment area- it’s dead- remember?  
  28. We keep hearing that email is dead- but research shows that email is still alive and kicking! Nathaniel is so fed up of people saying its dead!
  29. Over 30 percent of people remain on Exchange 2003, released when Mark Zuckerberg was 19 and still at college! Microsoft are already two versions ahead but people haven’t kept pace.   It’s not therefore surprising that users used to using Facebook, Twitter and Gmail rebel against out of date email systems.
  30. For example- who has a smartphone?
  31. And who has a smartphone for work?
  32. Who can receive their work email on a Smartphone?
  33. Who uses their personal email for work?
  34. The survey showed 85% of under 25’s use personal email for work
  35. 1 in 5 on a regular basis
  36. They now know better than ever before- people have on average 3 email accounts including work. 52% of under 25’s think their personal mailbox is better than their corporate mailbox.
  37. And I’m not alone in that either- 66% of people say that email is their preferred communication vehicle at work.
  38.  Why? It’s because email is the easiest, most non-obtrusive way to manage work and personal communications.
  39. 79% of people send work emails from their personal accounts- 1 in 5 on a regular basis.
  40. There’s a disconnect here
  41. The big question was WHY?
  42. And in terms of storage- people have been trained to think of storage as unlimited. Despite the limitations of traditional email systems.  
  43. Anyone who’s tried to manage mailbox sizes on Exchange 2003 understands that storage isn’t unlimited- at least without a significant cost.
  44. Not surprising that 56% of people have mailbox frustrations and 39% over the size of their mailboxes.  
  45. Or is it that in order to remain productive and flexible this generation “workaround” security policies?   The restrictive policies that IT has put into place for “security” have been foiled by these workaround workers, and they’re potentially damaging the Enterprise.
  46. I don’t think this is a problem we can ignore any more. SO what’s the solution? I think there are other answers to protect the organisations value.
  47. But IT aren’t entirely to blame- they’re struggling to find a balance between employee empowerment and control.  
  48. But the problem is that the perimiter is gone. You can’t trust your own network anymore.
  49. Force Can’t Solve All Problems- "The more you tighten your grip… the more star systems will slip through your fingers.” -- Princess Leia
  50. We need to enable them to use corporate systems, not because they have to, but because they prefer to.
  51. What can we do today to extend the corporate email environment to try and give users the empowerment they want while retaining control for the enterprise?
  52. Offloading historical mailbox storage into the cloud- a cloud archive is an excellent way to simultaneously get control over mailbox sizes on premise while enabling users to have unlimited storage.
  53. And the research backs it up- 40% of people would be less likely to workaround corporate systems if they had an unlimited mailbox. A significant security uplift.
  54. Let’s not forget about uptime either. 86% consider it essential that email is problem free.
  55. Cloud Continuity- DR/BC much cheaper and easier in the Cloud