{"id":2671,"date":"2019-08-06T09:01:41","date_gmt":"2019-08-06T13:01:41","guid":{"rendered":"http:\/\/www.exchangedefender.com\/blog\/?p=2671"},"modified":"2019-07-15T13:59:40","modified_gmt":"2019-07-15T17:59:40","slug":"exchangedefender-phishing-firewall-epf-scary-truth-behind-phishing","status":"publish","type":"post","link":"https:\/\/www.exchangedefender.com\/blog\/2019\/08\/exchangedefender-phishing-firewall-epf-scary-truth-behind-phishing\/","title":{"rendered":"ExchangeDefender Phishing Firewall (EPF): Scary Truth behind Phishing"},"content":{"rendered":"\n<p>ExchangeDefender Phishing Firewall has been a huge success in it&#8217;s initial roll out and I wanted to take a moment to bring you up to speed on our progress and our end goal: to eliminate phishing and spear phishing as a threat to our clients. I do not intend to mince words here, this is the #1 threat out there &#8211; 90% of all compromises and breeches start with a phishing email. Stopping it, as an email security company, is our #1 job and I&#8217;m happy to report that initial results are stunning.<\/p>\n\n\n\n<p>Little bit of a rewind: Until now the most popular way to fight phishing and spear phishing was through &#8220;education&#8221; &#8211; there is an entire cottage industry of supposed &#8220;phishing education&#8221;, testing, refreshers &#8211; and it all revolves around training people to hover over links in Outlook, what not to click, what to read. It will not surprise you that such &#8220;training&#8221; is practically worthless, but they say that a picture is worth a thousand words so here is our phishing book:<\/p>\n\n\n\n<ul class=\"wp-block-gallery aligncenter columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"674\" src=\"http:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/07\/First48-EPF-Phishing-Firewall-1024x674.png\" alt=\"\" data-id=\"2676\" data-link=\"http:\/\/www.exchangedefender.com\/blog\/?attachment_id=2676\" class=\"wp-image-2676\" srcset=\"https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/07\/First48-EPF-Phishing-Firewall-1024x674.png 1024w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/07\/First48-EPF-Phishing-Firewall-300x197.png 300w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/07\/First48-EPF-Phishing-Firewall-768x506.png 768w, https:\/\/www.exchangedefender.com\/blog\/wp-content\/uploads\/2019\/07\/First48-EPF-Phishing-Firewall.png 1027w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul>\n\n\n\n<p>In the 48 hours following 4th of July weekend in United States, dangerous links in the email were clicked on over 770,000 times.<\/p>\n\n\n\n<p>Without ExchangeDefender Phishing Firewall, these links would have redirected our clients to dangerous sites that likely would have lead to a compromise or a security breach. So much for training.<\/p>\n\n\n\n<p>What&#8217;s even more telling is that, even with our firewall in place, 164,000 people decided to proceed to a dangerous site anyhow.<\/p>\n\n\n\n<p><strong>If more than 1 out of 5 clicks in your email will take you somewhere dangerous, how well is your training performing?<\/strong><\/p>\n\n\n\n<p>With ExchangeDefender Phishing Firewall we are enabling companies to setup policies, restrict access, provide intelligence as the user clicks &#8212; and we provide logging giving you an idea who attempted to trash your organizations network.<\/p>\n\n\n\n<p>The scary truth behind phishing is that training is only useful in blatantly apparent cases &#8211; the kind that will NEVER even get to your inbox. Our SPAM filtering detects dangerous email content and filters it out before it has a chance to get to your Inbox. The stuff that we can flag as dangerous &#8211; thanks to user reporting, audits, and look-ahead scanning is far more sophisticated than anything we could pack into a SPAM filter &#8211; and it gives your users real intelligence on what they are about to click on. You cannot expect users to remember all their training and to be a web security analyst &#8211; their job is acting on the email.<\/p>\n\n\n\n<p>Our job, is making sure the emails get to them clean and free of dangerous malware. Once they click on the links in the email &#8211; we are going one step ahead &#8211; and leveraging our industry relationships (data feeds and infosec sharing of dangerous content) to make sure you know exactly what you&#8217;re clicking on.<\/p>\n\n\n\n<p>Phishing is immensely profitable and far more effective than any other form of hacking &#8211; the user literally clicks and gives the hacker the keys to the network &#8211; and our ExchangeDefender Phishing Firewall helps remove the danger and reduces phishing to merely an annoyance.<\/p>\n\n\n\n<p>The numbers speak for themselves.<\/p>\n\n\n\n<p> Sincerely,<br> Vlad Mazek<br> CEO<br> ExchangeDefender<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,1,46,48],"tags":[51,52,149,139,136],"class_list":["post-2671","post","type-post","status-publish","format-standard","hentry","category-exchangedefender","category-uncategorized","category-product-features","category-security","tag-email","tag-email-security","tag-epf","tag-phishing-firewall","tag-phishing-protection"],"_links":{"self":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/comments?post=2671"}],"version-history":[{"count":4,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2671\/revisions"}],"predecessor-version":[{"id":2677,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/posts\/2671\/revisions\/2677"}],"wp:attachment":[{"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/media?parent=2671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/categories?post=2671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exchangedefender.com\/blog\/wp-json\/wp\/v2\/tags?post=2671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}