using return path data to protect your brand: security breakout session - la

26
Using Return Path Data to Protect Your Brand Security Breakout Session Brian Westnedge, Sr. Director of Client Services

Upload: return-path

Post on 13-Feb-2017

236 views

Category:

Data & Analytics


0 download

TRANSCRIPT

Page 1: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Using Return Path Data to Protect Your Brand

Security Breakout Session

Brian Westnedge, Sr. Director of Client Services

Page 2: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Agenda •  Email fraud trends and impact

•  The power of data: email threat intelligence •  The Return Path Data Cloud •  Tactics used by cybercriminals today

•  Unite against email fraud: tips for defending your customers, brand, and bottom line

•  Questions

Page 3: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Email Fraud Trends & Impact

Page 4: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Email Delivers Business Value…

Increases Customer Loyalty

Boosts Revenue

Reduces Operating Costs

Page 5: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

…But Its Impact Is Being Eroded

5 out of 6 big companies

are targeted with phishing attacks

Phishing costs brands worldwide $4.5 billion

each year

RSA identifies a phishing attack

every minute

Email fraud has up to a 45%

conversion rate

Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm

$4.5 B 1 MIN 5/6 45%

Page 6: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Phishing Leads To – Revenue Losses •  Reduced trust in brand:

•  Subscribers don’t know what to trust

•  Reduced effectiveness of email •  ISPs don’t know what to trust

Customers are 42% less likely to interact with a brand after being phished or spoofed.

Page 7: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Phishing Leads To – Unwanted Media Attention

Page 8: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

“If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.”

Bryan Littlefair Global Chief Information Security Officer

Aviva

Page 9: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Phishing Leads To – Remediation Costs

Fraud Losses Malware Infection Investigation Remediation

Page 10: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Can You Spot a Spoof?

Page 11: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Anatomy Of A Phishing Email

to: You <[email protected]>

from: Phishing Company <[email protected]>

subject: Unauthorized login attempt

Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team

1 attachment

Making an email look legitimate by

spoofing the company name in

the “Display Name” field.

Tricking email servers into

delivering the email to the inbox by spoofing the “envelope from”

address hidden in the technical header

of the email.

Including logos, company terms,

and urgent language in the body

of the email.

Making an email appear to come from a brand by using a legitimate company domain, or a domain

that looks like it in the “from” field.

Creating convincing subject lines to drive

recipients to open the message.

Including links to malicious websites

that prompt users to give up

credentials

Including attachments

containing malicious content.

Page 13: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

The Power of the Right Data

Page 14: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Knowledge Is Your Best Defense

•  We know there is no silver bullet.

•  But defense starts with understanding.

•  Data is the key to that understanding.

Page 15: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Breadth, Depth, and Speed

Contactually Molto Paribus GetAirHelp

Message Finder Unsubscriber Organizer

Page 16: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data

EMAIL THREAT INTELLIGENCE

· Domain-spoofing alerts

· Brand-spoofing intelligence

· Suspicious activity map

· Fraudcaster URL feed

· Sender Score: IP reputation

Page 17: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Email Fraud: Primary Attack Vectors

Domain Spoofing (from domains owned by the brand)

Brand Spoofing (from domains outside the brand’s control)

[email protected] [email protected]

Page 18: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

30% of Attacks Spoof Domains You Own

30% Domain Spoofing •  Active Emailing Domains •  Non-Sending Domains •  Defensively-Registered

Domains

70% Brand Spoofing •  Cousin Domains •  Display Name Spoofing •  Subject Line Spoofing •  Email Account Spoofing

Source: Return Path / APWG White Paper, 2014

Page 19: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.

Page 20: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Leading Companies Fighting Email Fraud

Page 21: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

DMARC (Domain-based Message Authentication Reporting & Conformance):

•  Technical specification created to help reduce the potential for email-based abuse (www.dmarc.org)

•  Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control

•  Provides threat reporting mechanism (aggregate and forensic data)

#1: Authenticate Your Email

Page 22: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

“Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.”

Edward Tucker Head of Cyber Security

Her Majesty’s Revenue & Customs

Page 23: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

•  Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence.

•  Get visibility into all types of email threats targeting you today.

#2: Leverage Email Threat Intelligence

Page 24: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

•  The reality is, some attacks are always going to get through. •  The more prepared your customers are, the better.

•  Create an educational website •  Include anti-fraud language within your legitimate email •  In the event of an attack, warn your customers immediately

#3: Educate Your Customers

Page 25: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

•  Engage with Brand Protection teams to make the business case.

•  Create a sense of urgency.

•  Communicate the risks that result from not taking action: •  Email fraud destroys brand reputation and erodes customer loyalty •  Email fraud thwarts email marketing effectiveness •  Email fraud negatively impacts revenue

#4: Raise Awareness with Top Executives

Page 26: Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

Learn More

www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel