{"id":13210,"date":"2020-02-27T00:00:40","date_gmt":"2020-02-27T00:00:40","guid":{"rendered":"https:\/\/exigotech.com.au\/?p=13210"},"modified":"2023-08-28T09:52:05","modified_gmt":"2023-08-28T09:52:05","slug":"how-to-use-sophos-email-advanced-to-prevent-email-phishing-attacks","status":"publish","type":"post","link":"https:\/\/exigotech.co\/sg\/blog\/how-to-use-sophos-email-advanced-to-prevent-email-phishing-attacks","title":{"rendered":"How to Use SOPHOS Email Advanced to Prevent Email Phishing Attacks?"},"content":{"rendered":"<p>Australian businesses claim to have lost more than $7.2 million due to security breaches and phishing emails. Most of this loss is around $3.8 million because of sophisticated business email compromise scams. Scammers hack business email systems, impersonate emails and change the email sender to appear from a trusted source. The scammers then request to change the payment details so that the payment is done to the scammer instead of the intended business. The email scams are not just limited to huge corporate houses. The scammers even target the local sports club or community groups. No matter what size the business is, the truth is that such scams affect the bottom line of businesses.<\/p>\n<h2>How to Prevent Email Phishing Attacks?<\/h2>\n<p>To prevent such attacks, <strong><a href=\"https:\/\/exigotech.co\/au\/services\/security\/sophos-xg-solutions\">SOPHOS<\/a><\/strong> has made <strong><a href=\"https:\/\/exigotech.co\/au\/blog\/sophos-firewall-a-security-shield-for-your-latest-healthcare-devices-during-covid-19\">several arrangements<\/a><\/strong> which enable you to detect and even block these. Impersonation attacks are done from uncertain sources and hence are hard to combat and track down. The phishing emails doesn\u2019t carry any malicious payload and are unidentifiable. They are often sent with the name of a trusted employee in the organisation and therefore it is almost next to impossible for any receiver to also identify. Also, the scammers launch this attack from a free emailing tool or use a domain name which is quite similar to any corporate domain name.<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": {\n    \"@type\": \"Question\",\n    \"name\": \"How to Prevent Email Phishing Attacks?\",\n    \"acceptedAnswer\": {\n      \"@type\": \"Answer\",\n      \"text\": \"To prevent such attacks, SOPHOS has made several arrangements which enable you to detect and even block these. Impersonation attacks are done from uncertain sources and hence are hard to combat and track down. The phishing emails doesn\u2019t carry any malicious payload and are unidentifiable. They are often sent with the name of a trusted employee in the organisation and therefore it is almost next to impossible for any receiver to also identify. Also, the scammers launch this attack from a free emailing tool or use a domain name which is quite similar to any corporate domain name.\"\n    }\n  }\n}\n<\/script><\/p>\n<p>The SOPHOS email advanced offers the required protection against phishing email attacks and also protect your organisation against other advanced attacks. With SOPHOS, you can strengthen the security infrastructure of your organisation and avoid any email phishing attacks.<\/p>\n<ul>\n<li>SOPHOS email advanced first compares the mail addresses or sender\u2019s names with the names of commonly abused cloud service providers. The arrangement is such that the name of the sender is also checked with any of the VIPs or management personnel in the organisation.<\/li>\n<li>SOPHOS email advanced offers a simple arrangement where the VIPs of your organisation are first identified and then added for policy analysis.<\/li>\n<li>SOPHOS checks the header information and compares the display name with the email address from which the email was sent. The domain names are checked to verify if it\u2019s a free domain, corporate lookalike or any VIP\u2019s name is impersonated.<\/li>\n<\/ul>\n<h2>What More can you Do with SOPHOS Email Advanced?<\/h2>\n<ul>\n<li>\n<h4><strong>Identify VIPs<\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>VIPs are those employees in the organisation who are in higher positions in the management and are quite likely to be impersonated. <strong><a href=\"https:\/\/assets.sophos.com\/X24WTUEQ\/at\/f84fgz64xhf87tckpk3jk59k\/sophos-email-ds.pdf\" rel=\"nofollow noopener\" target=\"_blank\">SOPHOS email<\/a><\/strong> advanced application allows you to create a list of 200 VIPs and ensure that their names are not used to send phishing emails. If you have an active directory synchronisation, then you can select the \u201cHelp me find VIPs\u201d option and SOPHOS email advanced will look for people with the designations such as CEO, CFO, president, human resources director, basically the ones who are likely to be impersonated.<\/p>\n<ul>\n<li>\n<h4><strong>Act on threats<\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>SOPHOS email advanced protection enables your security team to stop the suspicious messages from landing in your team\u2019s inbox. Also, the subject line is checked for security purposes and if there is any issue then the application will also banner the emails. A report \u201cAt Risk Users\u201d can be extracted which gives you visibility of the phishing threats. The reports provide detailed information such as how many attempts were made from phishing impersonations, which users are either blocked or warned from visiting malicious content. The report also gives you the number of phishing emails sent to a particular user so that you can know which user is particularly targeted. You also receive information such as the summary of phishing emails like who sent it and who replied to it.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-15530\" src=\"https:\/\/exigotech.co\/wp-content\/uploads\/2020\/02\/Protect-superior-phishing.jpg\" alt=\"\" width=\"940\" height=\"438\" srcset=\"https:\/\/exigotech.co\/wp-content\/uploads\/2020\/02\/Protect-superior-phishing.jpg 940w, https:\/\/exigotech.co\/wp-content\/uploads\/2020\/02\/Protect-superior-phishing-480x224.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 940px, 100vw\" \/><\/p>\n<ul>\n<li>\n<h4><strong>Protect superior phishing<\/strong><\/h4>\n<\/li>\n<\/ul>\n<p>With SOPHOS email advanced you can block or avoid the suspicious messages from entering your secured infrastructure. The application blocks the malicious URL and gives you the exact time when the URL containing the malicious content was clicked by any of your employees.<\/p>\n<h2>The Bottom Line<\/h2>\n<p>Furthermore, the users who have clicked on the malicious emails or URLs can be enrolled onto the training programs to improve awareness. However, you need to purchase a phish treat license to become eligible for the training. Email phishing is a deep concept and you need an expert\u2019s help to get all the policies correctly implemented and strengthen your security infrastructure.<\/p>\n<p>Exigo Tech being a SOPHOS partner is one of the ideal places to get advice and suggestions for securing your infrastructure and preventing it from all the malicious email phishing attacks. To meet one of our security experts, call <strong><a href=\"tel:1300 394 468\" data-wpel-link=\"internal\">1300 EXIGOTECH (394 468)<\/a><\/strong> or drop an email at <strong><a href=\"mailto:sales@exigotech.com.au.\">sales@exigotech.com.au<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Australian businesses claim to have lost more than $7.2 million due to security breaches and phishing emails. Most of this&#8230;<\/p>\n","protected":false},"author":6,"featured_media":15528,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[16],"tags":[290],"class_list":["post-13210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-sophos"],"acf":[],"_links":{"self":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/13210","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/comments?post=13210"}],"version-history":[{"count":1,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/13210\/revisions"}],"predecessor-version":[{"id":57032,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/posts\/13210\/revisions\/57032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/media\/15528"}],"wp:attachment":[{"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/media?parent=13210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/categories?post=13210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exigotech.co\/sg\/wp-json\/wp\/v2\/tags?post=13210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}