chat
expand_more

5 Essential Insights from ESG’s Report on Protecting Communications

Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
May 11, 2023

Email has long been the preferred method of business communication, but as technology has advanced and the world has shifted to hybrid work, the number of ways to communicate has grown exponentially. Most organizations now use digital communication methods beyond email, including cloud-based collaboration tools, which provide better efficiency in distributed work environments.

There is little denying that these collaboration tools, like Slack, Microsoft Teams, and Zoom, offer a slew of benefits. But they also open the door for bad actors to deploy new and invasive attacks. By engaging with users through social engineering tactics, attackers can evade automated controls and extend phishing, business email compromise (BEC), credential theft, and other email attacks beyond just email.

ESG recently dove into this problem with a survey of nearly 500 IT and cybersecurity professionals. The ESG Survey: The Freedom to Communicate and Collaborate is a third-party analysis commissioned by Abnormal Security and conducted by Enterprise Strategy Group (ESG) which identifies key challenges, objectives, and security risks present across collaborative cloud applications. Here you’ll find a few of the most significant insights from the survey and how leaders are thinking about security decisions across major organizations.

Communication and Collaboration Tools Abound

Electronic collaboration tools have become a cornerstone of the distributed work model, for both internal and external communication. In addition to email, organizations depend on many tools to provide efficient workflows, such as video conferencing and file-sharing technologies. Thus, the use of multiple collaboration tools has become commonplace.

47% of respondents are currently using from 6 to 10 communication and collaboration tools, and 35% of respondents are using 11 or more. Among these tools, video conferencing, email, and messaging are the most commonly sanctioned.

ESG Blog 1

Multi-Channel Attacks Are Gaining Momentum

The increased adoption of collaborative tools also provides bad actors with more attack opportunities. Socially-engineered attacks have become a commonplace occurrence, but as organizations implement more effective email security, cybercriminals are turning to other applications. In fact, more than half of survey respondents said they’re experiencing daily or weekly attacks involving their extended communications apps.

ESG Blog 2

All Types of Attacks are Concerning to Security Leaders

When it comes to threats, ransomware is a top concern for communication and collaboration tools, along with the ongoing array of phishing and malware-based attacks. 38% of respondents cited ransomware as the most concerning type of threat that leverages communication and collaboration mechanisms, but phishing and impersonation were also of concern. These concerns are similar to those surrounding email communications, which showcases how these email-like applications are susceptible to the same threat as email itself.

ESG Blog 3

Email is Still Considered the Most Vulnerable to Threats

While threat actors are exploring new avenues for deploying social engineering tactics, and security leaders are starting to think of how to best protect against those emerging attacks, it doesn’t look like they’re backing off of email anytime soon. According to the ESG survey, nearly 40% of respondents believe that email is still their most vulnerable communication channel before collaborative applications.

38% of respondents cited email as their most vulnerable communication channel. File sharing and messaging applications round out the top three.

ESG Blog 4

Organizations are Focused on Strengthening All Communication Channels

The good news is that organizations are focused on strengthening all communication and collaboration channels collectively, including email. More than a quarter consider strengthening security controls across multiple communication and collaboration channels their top priority, with more than half classifying it as a high priority.

83% of respondents said communication and collaboration security is either a high or top priority for their organization.

ESG Blog 5

How Abnormal Closes Your Security Gaps

So how do you do that? At Abnormal, we recently expanded our behavioral AI-based email security platform to provide additional protection across the most popular collaboration apps used today. When attackers target connected email-like applications such as Slack, Microsoft Teams, and Zoom, Abnormal recognizes malicious messages and compromised accounts.

The platform provides insights in the same portal so security teams can see the full scope of the risk and take downstream action. With Abnormal, your organization can stay one step ahead of new and advanced threats, ensuring all of your communication and collaboration channels are secure.

Download your copy of the ESG Survey to learn more about the latest trends shaping communication and collaboration application security.

Interested in learning more about how Abnormal can protect your collaboration apps?

Schedule a Demo
5 Essential Insights from ESG’s Report on Protecting Communications

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

 
Integrates Insights Reporting 09 08 22

Related Posts

B 4 9 24 Send Grid
SendGrid and Mailtrap credentials are being sold on cybercrime forums for as little as $15, and they are used to send phishing emails and bypass spam filters. Learn how infostealers and checkers enable this underground market.
Read More
B Convergence S2 Recap Blog
Season 2 of our web series has come to a close. Explore a few of the biggest takeaways and learn how to watch all three chapters on demand.
Read More
B 1500x1500 Adobe Acrobat Sign Attack Blog
Attackers attempt to steal sensitive information using a fraudulent electronic signature request for a nonexistent NDA and branded phishing pages.
Read More
B 4 15 24 RBAC
Discover how a security-driven RBAC design pattern allows Abnormal customers to maximize their user setup with minimum hurdles.
Read More
B 4 10 24 Zoom
Learn about the techniques cybercriminals use to steal Zoom accounts, including phishing, information stealers, and credential stuffing.
Read More
Social Images for next Cyber Savvy Blog
Explore how Alex Green, the CISO of Delta Dental, safeguards over 80 million customers against modern cyber threats, and gain valuable insights into the cybersecurity landscape.
Read More