Abstract Seafoam Hills

2022 Email Security Survey: A Look at Emerging Attacks, Tools, and Trends

Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.

July 20, 2022

In the past two years, the prevalence of email-borne cyber threats—which was already high—soared to unprecedented levels. According to data from the FBI, both business email compromise (BEC) and ransomware attack volumes swelled to record highs, as did the number of reported phishing attacks.

In response, security leaders are changing how they think about email security. We partnered with Aimpoint Group to survey 300 security leaders to discover what matters most to them when it comes to email security. Based on this survey, our latest 2022 Email Security Trends Report explores how email security strategy is changing, and how security leaders are changing their tactics to better protect their organizations.

The Challenges of Using Legacy Technology

Gartner estimates that 70% of organizations had already adopted a cloud-based email solution by late 2021, and our survey data shows that 93% of organizations already have a cloud-based solution or intend to implement one in the future. As enterprises shift to the cloud, many are experiencing a mismatch between their legacy security architecture and the needs of their cloud email environment.

Secure email gateways (SEGs), in particular, were engineered for an on-premises world rather than today’s cloud email ecosystem. And as threat actors shift their tactics toward social engineering, the inability of the SEG to stop modern attacks is becoming more apparent. In fact, 78% of survey respondents believe that secure email gateways are largely incapable of protecting modern cloud email environments.

Meanwhile, major cloud providers including Microsoft and Google have made considerable investments in improving the native capabilities of their offerings. Gartner predicts at least 40% of enterprises will use built-in capabilities from a cloud email provider in place of the secure email gateway by 2023.

That said, advanced features and controls are typically only available as an add-on or part of a higher-priced licensure tier from some vendors—and not at all from others. Further, these native security solutions tend to operate by blocking known threats, which means organizations that rely on these capabilities alone may remain vulnerable to never-before-detected threats or sophisticated social engineering and account compromise attacks. Similar to the ineffectiveness of the secure email gateway, 79% of stakeholders believe that native controls offer insufficient threat protection on their own.

So even as enterprises adopt more of cloud providers’ built-in email security capabilities, large numbers of email-borne attacks are still circumventing enterprise defenses. In fact, participants indicate that malware and ransomware are still the biggest concerns, closely followed by credential phishing and business email compromise. This reality makes it abundantly clear that it’s now essential to implement email security solutions that are more effective and efficient than those of the past.

It also requires security teams to shift their mindset, away from a rules-and-policies-based approach to preventing attacks, and toward a reliance on human and behavioral analysis. For many organizations, this will mean displacing the legacy SEG and turning to a combination of modern email security solutions that were designed for a cloud-first world.

The Need for ICES is Urgent and Growing

Recognizing that new email security tools are now available to stop the attacks that bypass traditional solutions, Gartner coined the category of integrated cloud email security (ICES) in the 2021 Market Guide to Email Security.

ICES products are cloud-native solutions that analyze email content via API connectivity so that there’s no need to change the MX records. These platforms leverage technologies like natural language processing (NLP) and behavioral AI to detect and block the malicious emails that legacy solutions miss. And this survey shows that to combat tomorrow’s increasingly sophisticated cyber threats, enterprises will need this sort of innovation—either in addition to or in place of their current tools.

Survey respondents seem to be on the same page with 90% of all participants agreeing that a combination of native security capabilities within cloud email platforms and the implementation of an integrated cloud email security solution can replace the full functionality of a SEG.

Aimpoint seg ices

With the number of impersonation-based attacks like BEC and attacks from compromised accounts still increasing, email security strategies must advance beyond the reactive blocking of known threats. These results show that security leaders are looking to innovative solutions that integrate via API and use artificial intelligence (AI) to baseline known good behavior and block malicious deviations.

Survey Shows Need for Advanced Email Protection

There is little denying that ransomware attacks, business email compromise scams, and other advanced email-borne threats will persist. And because traditional tools cannot protect against these evolving threats, it’s essential to adopt a multi-layered approach—one that’s suited to modern IT ecosystems and architectures.

Security leaders recognize that they must also harness technologies like natural language processing and artificial intelligence to increase efficiency, all while centralizing visibility and control to stay ahead of evolving attacks. As this survey shows, organizations are already shifting to cloud email security to protect themselves, with ICES solutions front of mind.

To learn more about the challenges and opportunities that today’s enterprise email security teams face and how leaders are thinking about evolving their email security strategy for the future, download the full report.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 1500x1500 Gartner Peer Insights Reviews blog
The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
Read More
B Podcast Engineering 10 07 27 22
In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
Read More
B 1500x1500 Email Attack Insights
Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
B 07 19 22 2022 Email Security Trends 1
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Read More
B 07 14 22 4types
Understanding the ways cybercriminals execute financial supply chain compromise is key to preventing your organization from falling victim to an attack.
Read More
B 07 07 22 Financial Supply Chain Compromise
Financial supply chain compromise, a subset of business email compromise (BEC), is on the rise. Learn how threat actors launch these sophisticated attacks.
Read More
B 06 15 22 Coats Webinar Recap Blog
Learn why Coats, the global leader in industrial thread manufacturing, skipped the SEG and chose Abnormal Integrated Cloud Email Security (ICES) to protect its workforce from modern email threats.
Read More
B 07 30 22 Q2 2022
We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
Read More
B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More