chat
expand_more

5 Essential Insights from ESG’s Report on Protecting Communications

Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
May 11, 2023

Email has long been the preferred method of business communication, but as technology has advanced and the world has shifted to hybrid work, the number of ways to communicate has grown exponentially. Most organizations now use digital communication methods beyond email, including cloud-based collaboration tools, which provide better efficiency in distributed work environments.

There is little denying that these collaboration tools, like Slack, Microsoft Teams, and Zoom, offer a slew of benefits. But they also open the door for bad actors to deploy new and invasive attacks. By engaging with users through social engineering tactics, attackers can evade automated controls and extend phishing, business email compromise (BEC), credential theft, and other email attacks beyond just email.

ESG recently dove into this problem with a survey of nearly 500 IT and cybersecurity professionals. The ESG Survey: The Freedom to Communicate and Collaborate is a third-party analysis commissioned by Abnormal Security and conducted by Enterprise Strategy Group (ESG) which identifies key challenges, objectives, and security risks present across collaborative cloud applications. Here you’ll find a few of the most significant insights from the survey and how leaders are thinking about security decisions across major organizations.

Communication and Collaboration Tools Abound

Electronic collaboration tools have become a cornerstone of the distributed work model, for both internal and external communication. In addition to email, organizations depend on many tools to provide efficient workflows, such as video conferencing and file-sharing technologies. Thus, the use of multiple collaboration tools has become commonplace.

47% of respondents are currently using from 6 to 10 communication and collaboration tools, and 35% of respondents are using 11 or more. Among these tools, video conferencing, email, and messaging are the most commonly sanctioned.

ESG Blog 1

Multi-Channel Attacks Are Gaining Momentum

The increased adoption of collaborative tools also provides bad actors with more attack opportunities. Socially-engineered attacks have become a commonplace occurrence, but as organizations implement more effective email security, cybercriminals are turning to other applications. In fact, more than half of survey respondents said they’re experiencing daily or weekly attacks involving their extended communications apps.

ESG Blog 2

All Types of Attacks are Concerning to Security Leaders

When it comes to threats, ransomware is a top concern for communication and collaboration tools, along with the ongoing array of phishing and malware-based attacks. 38% of respondents cited ransomware as the most concerning type of threat that leverages communication and collaboration mechanisms, but phishing and impersonation were also of concern. These concerns are similar to those surrounding email communications, which showcases how these email-like applications are susceptible to the same threat as email itself.

ESG Blog 3

Email is Still Considered the Most Vulnerable to Threats

While threat actors are exploring new avenues for deploying social engineering tactics, and security leaders are starting to think of how to best protect against those emerging attacks, it doesn’t look like they’re backing off of email anytime soon. According to the ESG survey, nearly 40% of respondents believe that email is still their most vulnerable communication channel before collaborative applications.

38% of respondents cited email as their most vulnerable communication channel. File sharing and messaging applications round out the top three.

ESG Blog 4

Organizations are Focused on Strengthening All Communication Channels

The good news is that organizations are focused on strengthening all communication and collaboration channels collectively, including email. More than a quarter consider strengthening security controls across multiple communication and collaboration channels their top priority, with more than half classifying it as a high priority.

83% of respondents said communication and collaboration security is either a high or top priority for their organization.

ESG Blog 5

How Abnormal Closes Your Security Gaps

So how do you do that? At Abnormal, we recently expanded our behavioral AI-based email security platform to provide additional protection across the most popular collaboration apps used today. When attackers target connected email-like applications such as Slack, Microsoft Teams, and Zoom, Abnormal recognizes malicious messages and compromised accounts.

The platform provides insights in the same portal so security teams can see the full scope of the risk and take downstream action. With Abnormal, your organization can stay one step ahead of new and advanced threats, ensuring all of your communication and collaboration channels are secure.

Download your copy of the ESG Survey to learn more about the latest trends shaping communication and collaboration application security.

Interested in learning more about how Abnormal can protect your collaboration apps?

Schedule a Demo
5 Essential Insights from ESG’s Report on Protecting Communications

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Manufacturing Industry Attack Trends Blog
New data shows a surge in advanced email attacks on manufacturing organizations. Explore our research on this alarming trend.
Read More
B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More
B Microsoft Blog
Explore the latest cybersecurity insights from Microsoft’s 2024 Digital Defense Report. Discover next-gen security strategies, AI-driven defenses, and critical approaches to counter evolving threats and safeguard your organization.
Read More
B Osterman Blog
Explore five key insights from Osterman Research on how AI-driven tools are revolutionizing defensive cybersecurity by enhancing threat detection, boosting security team efficiency, and countering sophisticated cyberattacks.
Read More
B AI Native Vendors
Explore how AI-native security like Abnormal fights back against AI-powered cyberattacks, protecting your organization from human-targeted threats.
Read More