Once the backbone of the Internet revolution, email has become a drag on efficiency, productivity, and the ultimate pipeline for hackers to gain access to personal information and corporate networks. It's time to think of a new paradigm, cloud-based, collaborative, without file attachments or the "poison darts" of malware and Trojan horses.
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Email IT Security Breaches
1. Achilles Heel of Email
Think Stock
www.cloudnician.com
by
James O. Grundvig
2. EVOLUTION OF
EMAIL
2
Route 80 Project
North Jersey
NJ-DOT HQ
Trenton, NJ
12 kb file
(Cover Sheet)
1 9 9 2
Email Replaces Fax One Page at a Time
email
20 Minutes – 60 Miles
Think Stock Think Stock
3. 3
10 million email accounts
16 million Internet users
25,000 websites
Dial-up Internet Service
THE BIG BANG
INTERNET
1 9 9 5
Netscape’s Web Browser Opens the Internet
Think Stock
5. 5
SOCIAL ENGINEERING
OF EMAIL
2 0 1 2
Hackers Exploit People
Your friends can be used
against you
Think Stock
People are the weak link
Data Trolls your online life
29% of cyber attacks are
conducted via email
7. BRIGHT IDEA
OF EMAIL…
1 to Many
Communication
Send Attached Files
Become more
productive but. . .
email
7Think Stock
8. 8
15 hrs
week
$28,000/yr
Lost time
918 million corporate email
accounts
105 emails sent per user
INEFFICIENCY
OF EMAIL
300 million emails sent each
day are “poison darts”
37% users don’t reply to email
Email wasn’t designed to be
collaborative
9. 9
DATA BREACH COSTS
TELECOM GIANT
“High-tech spies managed to infiltrate Telenor’s extensive security
network and empty the contents of the top executives’ personal
computers.” – Afterposten 3-17-13.
Telenor
$18B
31K
20
monitor
traffic
1open
zip file
Rev.
Employ.
10. 10
MORE DATA BREACHES
BY EMAIL
2012
Attacks
- 68.2% done by hackers
- 267 million records exposed
- 1 email exposed S. Carolina’s
3.8 million tax returns
- Evernote didn’t follow own
training: employee opened
“reset” password email (4-19-13)
email
12. 12
BOSTON MARATHON
BOMBING
Wounded Suspect brought to
Beth Israel Deaconess MC…
Halls
Empty
Police
Lockdown
Hospital
What if a Terrorist launched a
Cyber Attack on the IT Systems?
H
Think Stock
13. 13
Patient Privacy
& Data Security H
$2.4 million (2-year) avg.
cost to organization in PHI
45% claim >5 breaches (up
from 29% in 2010)
2,769 stolen records/breach
75% don’t secure medical
devices contain patient data
94% have leaked data
14. 14
WHICH PATIENT DATA
BREACH IS WORSE? H
Class-Action lawsuit Glen Falls Hospital NY
Class-Action lawsuit 22 Florida Hospitals
Wyoming Doctor’s personal email exposes
2,900 patient records
Oregon H&SU hacked twice in same year
2 Breaches, 2 States, 2 Hospitals, Same Day
– Utah & Mississippi
15. 15
CAN WE SECURE DATA?
email
ePhish training
won’t work
Think Stock
16. 16
SEPARATION OF
EMAIL & STATE
EMAIL
SERVER
Off-Premise
Cloud
Corporate IT Network
(on-premise)
External
Communication
FIREWALL
Few Employees
have email
Is this the New Paradigm?