Our mission is making INBOX.CLEAN™ a reality: stop phishing attacks — the root cause of 95% of breaches — before they reach users. Get the only solution that preemptively stops Business Email Compromise, malware, ransomware and other advanced threats by discovering and eliminating them before they cause damage.
Email Security has certainly come a long way. With cloud messaging now the standard versus the legacy on premise approach (Lotus Notes anyone?) the strategy of securing these clouds has also experienced a revolution.
Area 1’s cloud-native SaaS solution supports three key use cases: preemptive anti-phishing across all threat vectors (email, web, social, network); cloud email security / SEG replacement; and phishing security automation for SOC teams.
Area 1 is a Microsoft Certified Partner and a Google Cloud Security Technology Partner of the Year. We also integrate with a number of SIEM, SOAR, SEG and firewall technology providers to fit your unique infrastructure. Learn More
FIND A CHANNEL PARTNER
Work with trusted cybersecurity experts across the globe to secure your business. Learn about our partnerships with Legato Security, Optiv, SADA Systems, SYNNEX and others. Channel Partners Become A Channel Partner
The United States has a firm no negotiation policy with terrorists. Should we do the same with cybersecurity threat agents?
Ransomware attacks are one of the fastest-growing types of cybercrime in the modern world.
What is ransomware?
Ransomware is a type of malware that blocks access to your data or system. The hacker holds your information hostage until you pay a ‘ransom.’
And these kinds of attacks have disastrous impacts on our businesses, society, and world. Based on research, it is estimated that the total global ransomware damage costs to be $20 billion in 2021 alone, and we’re not even through the summer! The damage is far from over. In fact, it’s going to get worse.
Why are ransomware attacks increasing?
One fascinating reason for the surge in recent attacks is due to cyber risk insurance policies. Under the current cyber risk policy, insurance protects you in case of an attack, which can include data breach, malware infection, cyber extortion, business email compromise, and of course, ransomware.
However, cybersecurity risk insurance may contribute to the overall problem. Critics argue that by paying the astronomical ransom requested, we are, in effect, encouraging and actively contributing to the ransom attacks. The more we pay, the more attacks happen, the higher the premium, the more the payments. In effect, paying ransoms is not protecting you but a gift to the hackers.
Should we ban ransomware payments?
Much like how the United States government has a zero-tolerance, zero-negotiation policy for terrorism and hostage payments, we should also implement a similar ban on ransomware payments to threat actors.
If we do not have a protocol, we inadvertently encourage bad actors to launch ransomware attacks. This leads to an even more challenging environment for organizations to make independent decisions.
Standardizing a policy allows all parties–private and public entities– to respond in a coordinated response when cyber-hostage situations occur. In addition, a standard policy will reduce the incentive of threat actors to attack organizations in the future. For example, if hackers no longer benefit from ransomware attacks on U.S. corporations, what is the point of launching costly but essentially useless attacks?
What about cybersecurity insurance?
Cybersecurity risk insurance may cause more harm than good.
First, when a corporation pays out ransomware demands, it encourages future attacks. A study found that 68% of victims were attacked a second time within one year.
Second, by paying ransomware, it increases premium and overall payment.
Lastly, having only an insurance policy but no actual cloud-native, email security system, lulls the company into a false sense of security. If we believe that we are protected, there is less incentive to invest in protection that blocks all phishing attacks.
For every dollar invested into insurance rather than essential security products, the bad actors greatly benefit.
How Area 1 Security preempts ransomware attacks
With ransomware’s increased targeting and sophistication, an organization’s best chance of surviving a ransomware attack is to prevent it from reaching the organization in the first place.
In fact, analyst firm Gartner notes that the ransomware recovery cost can be nearly ten times the ransom demand once costs for downtime, recovery, increased cybersecurity insurance premiums, and credit monitoring for affected customers are taken into account.
Particularly with email phishing as the delivery mechanism of choice for ransomware groups, organizations need to focus on email security as a top means of preventing ransomware stage loaders from landing in inboxes.
Area 1 Security’s cloud-native platform, Area 1 Horizon™, offers comprehensive email security against ransomware and other advanced attacks. Through our massive-scale web crawling and threat indexing, we can discover malicious ransomware infrastructure 24 days before industry averages. In addition, we leverage small pattern analytics to detect even the most targeted ransomware without needing to rely on large volume samples.
Area 1 also uniquely uses deep payload scanning to detect ransomware hidden in links within attachments, nested links, or archives, even if domain fronting tactics are used. Adept at detecting first-stage loaders before ransomware is even deployed, Area 1 Security preemptively protects organizations from ransomware, business email compromise (BEC), and other advanced targeted attacks.
To find out more about how Area 1 Security preemptively detects and stops ransomware attacks,watch our “Proactive Protection Against Ransomware Attacks” on-demand webinar here, and download our Ransomware Solution Brief here.
Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 14 years in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.
Business Email Compromise (BEC), also sometimes referred to as email account compromise (EAC) or vendor email compromise (VEC), is a type of phishing attack that takes advantage of an existing relationship between a victim and organization.
https://www.area1security.com/wp-content/uploads/2022/04/BlogEmailBanner_BECAttackType_2022APR14.png13072500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-04-18 10:07:242022-04-28 08:48:24Understanding the Four Business Email Compromise Attack Types
Dear America’s sports-loving, company-securing fans: Before you find yourself glued this weekend to (what some call) THE biggest game in college basketball history, we are here to crown the 2022 March Hackness winner!
https://www.area1security.com/wp-content/uploads/2022/03/Champion-Banner_2.png10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-31 06:00:292022-04-28 08:49:23Area 1 Security Announces the Most Spoofed Brand of 2021
Area 1 Security’s Sixth Annual March Hackness: The Perfect Phishing Bracket is here! Learn who made the list of the top brands that attackers use in phishing lures.
https://www.area1security.com/wp-content/uploads/2022/03/SocialBanner_Blog_MarchHackness2021_2500x1000-Copy-2.jpg10002500Elaine Dzubahttps://www.area1security.com/wp-content/uploads/2022/04/Cloudflare-A1S-Logo-1-1.pngElaine Dzuba2022-03-26 20:45:192022-04-28 08:51:272022 March Hackness: The Return of the Phishing Bracket