Information Technology A to Z Index IT Service Support Request

In Focus on Services - Email Security

email security
Throughout our daily lives, it's common for us to engage in various forms of communication via email, both formally and informally. Many of us manage multiple email accounts to cater to different aspects of their lives. It's not unusual for us to maintain separate email addresses for work-related correspondence and personal interactions. Additionally, some individuals opt for disposable email accounts when engaging with online platforms or potentially spam-prone websites. This diverse email management approach reflects the evolving nature of our digital interactions and the need for tailored communication channels in different contexts.
 
Email security is an important university investment for several reasons:
 
  • Confidentiality: Email is not the best way to exchange sensitive information (e.g., student records, research findings, financial data, and personal information) and we discourage this as much as possible. Ensuring the confidentiality of this information is vital to protect individuals' privacy and comply with regulations like GDPR (General Data Protection Regulation) and FERPA (Family Educational Rights and Privacy Act).
  • Integrity: Email security helps maintain the integrity of communications within the university community. By preventing unauthorized access or tampering with emails, users can trust that the information they send and receive has not been altered maliciously.
  • Protection Against Phishing: Universities are prime targets for phishing attacks, where malicious actors impersonate legitimate entities to trick users into revealing sensitive information such as passwords, financial details, or personal data. Robust email security measures, including anti-phishing protocols, help safeguard against such threats.
  • Data Protection and Compliance: Universities often deal with regulatory requirements governing data protection and privacy. Ensuring email security helps universities comply with these regulations, avoiding potential legal and financial consequences resulting from data breaches or non-compliance.
  • Intellectual Property Protection: Universities engage in research and development activities, often generating valuable intellectual property. Secure email systems help protect intellectual property by preventing unauthorized access or theft of research findings, patents, and other proprietary information.
  • Network Security: Email security is a critical component of overall network security. Compromised email accounts can be used as entry points for broader attacks on university networks, potentially leading to data breaches, system disruptions, or other security incidents.
  • Maintaining Trust: A breach in email security can damage the trust and reputation of the university among its students, faculty, staff, alumni, and other stakeholders. By prioritizing email security, universities demonstrate their commitment to safeguarding sensitive information and fostering a secure digital environment for all users.
Understanding the risks of malicious and phishing emails is crucial in an academic environment where students, faculty, staff, and researchers regularly communicate and exchange sensitive information. Here are the key points to consider:
 
  • Targeted Attacks: Academic institutions are prime targets for malicious actors due to the wealth of valuable information they possess, including research data, intellectual property, financial records, and personal information of students and employees. Malicious emails often attempt to exploit vulnerabilities within the academic community for financial gain, data theft, or espionage purposes.
  • Phishing Attempts: Phishing emails are designed to trick recipients into divulging sensitive information such as usernames, passwords, financial details, or personal data. In an academic environment, phishing emails may masquerade as official communications from the university administration, faculty members, IT departments, or external organizations, luring recipients into clicking malicious links or downloading malware-infected attachments.
  • Impersonation Scams: Malicious actors may impersonate legitimate entities within the academic community, including professors, administrators, colleagues, or students, to gain trust and deceive recipients. Impersonation scams often involve requests for urgent action, financial transactions, or sensitive data disclosure, exploiting social engineering techniques to manipulate recipients' emotions and behaviors.
  • Data Breaches and Identity Theft: Successful phishing attacks can lead to data breaches and identity theft, compromising sensitive information stored within university systems and databases. Stolen credentials or personal data obtained through phishing emails may be exploited for fraudulent purposes, including unauthorized access to academic accounts, financial fraud, or identity theft.
  • Ransomware and Malware Infections: Malicious emails may contain attachments or embedded links that deliver ransomware, malware, or other forms of malicious software onto recipients' devices and network infrastructure. Ransomware attacks can encrypt valuable data, rendering it inaccessible until a ransom is paid, while malware infections may compromise system integrity, steal sensitive information, or facilitate further exploitation of university resources.
  • Reputational Damage: A successful phishing attack or data breach can result in reputational damage to the academic institution, eroding trust among students, faculty, staff, alumni, and external stakeholders. Public disclosure of security incidents may tarnish the university's reputation, undermine confidence in its ability to safeguard sensitive information, and deter prospective students, donors, and research collaborators.
  • Regulatory Compliance Requirements: Academic institutions are subject to regulatory requirements governing data protection, privacy, and cybersecurity. Compliance with regulations such as GDPR, FERPA, HIPAA, and PCI-DSS is essential to protect individuals' rights, maintain data privacy and security standards, and mitigate legal and financial liabilities associated with security breaches or non-compliance.

Microsoft Email Security Tools

 
EKU IT uses Microsoft tools to help maintain email security. Microsoft spam filters, particularly those integrated with services like Microsoft Exchange Online Protection (EOP) or Microsoft Defender for Office 365, operate using a combination of techniques to identify and block spam emails for university email accounts. Here's how they generally work:
 
  • Content Filtering: Microsoft's spam filters analyze the content of incoming emails to identify common spam characteristics. This includes analyzing the text, attachments, and embedded links for known spam keywords, phrases, or patterns. Content filtering also checks for suspicious attachments or file types commonly associated with malicious content.
  • Sender Reputation: Microsoft maintains a database of known spammers and suspicious senders based on their sending behavior and reputation across their network. Emails originating from senders with poor reputations or flagged for suspicious activities are more likely to be filtered as spam.
  • Machine Learning and Behavioral Analysis: Microsoft employs machine learning algorithms and behavioral analysis techniques to adaptively learn and identify new spam patterns and evolving threats. These algorithms analyze the behavior of emails and their senders to detect anomalies or deviations from normal email communication patterns, which may indicate spam or phishing attempts.
  • Blacklists and Whitelists: Microsoft's spam filters utilize internal and external blacklists and whitelists to classify email senders based on their reputation and trustworthiness. Emails from known spam sources or flagged as malicious by security vendors may be automatically blocked or flagged for review. Conversely, emails from trusted sources may bypass spam filtering altogether.
  • Spam Signatures and Heuristics: Microsoft's spam filters incorporate signatures and heuristics to identify known spam patterns and characteristics. Signatures are predefined patterns or identifiers associated with known spam emails, while heuristics analyze email attributes such as header information, formatting, and routing patterns to detect suspicious behavior indicative of spam.
  • User Feedback Mechanisms: Microsoft's spam filters leverage user feedback mechanisms to improve spam detection accuracy. Users can report spam emails or mark them as junk directly from their email clients, which helps train the spam filters to recognize similar patterns in the future.
  • Real-Time Threat Intelligence: Microsoft continuously monitors global email traffic and security threats to identify emerging spam trends and malware campaigns. Real-time threat intelligence feeds into the spam filtering algorithms to enhance detection capabilities and protect university email accounts from evolving threats.
By employing a combination of these techniques, Microsoft's spam filters help mitigate  the risk of spam, phishing, and other email-based threats for university email accounts, contributing to a more secure email environment for students, faculty, staff, and other stakeholders.
 

Where Do You Come Into This?

Our academic community faces persistent and evolving threats from malicious actors seeking to exploit vulnerabilities in our email systems. It's imperative that each of us remains vigilant and proactive in safeguarding our personal and institutional information. Here's how you can help:
 
  • Stay Informed: Familiarize yourself with common email threats such as phishing, malware, and impersonation scams. Stay updated on the latest tactics used by cybercriminals to deceive recipients and compromise email security. 
  • Think Before Clicking: Exercise caution when interacting with emails, especially those from unknown or suspicious senders. Avoid clicking on links, downloading attachments, or providing sensitive information in response to unsolicited emails without verifying their legitimacy. 
  • Verify Sender Authenticity: Before taking any action in response to an email, verify the sender's authenticity by checking the sender's email address, domain, and signature. Be wary of emails that contain spelling errors, grammatical mistakes, or urgent requests for personal or financial information. 
  • Report Suspicious Emails: If you receive an email that appears suspicious or potentially malicious, report it to the appropriate university authorities or IT department immediately. Most universities have mechanisms in place for reporting phishing attempts and security incidents to mitigate potential risks. 
  • Update Security Software: Ensure that your devices, including computers, smartphones, and tablets, have up-to-date antivirus software, firewalls, and security patches installed. Regularly scan your devices for malware and take necessary precautions to protect against unauthorized access and data breaches. 
  • Practice Strong Password Hygiene: Use strong, unique passwords for your university email accounts and other online services. Enable multi-factor authentication whenever possible to add an extra layer of security and prevent unauthorized access to your accounts. 
  • Participate in Security Awareness Training: Take advantage of security awareness training programs offered by your university to enhance your understanding of email security best practices, recognize potential threats, and learn how to respond effectively to security incidents.
  • ALWAYS send suspicious emails (before replying, clicking links, and opening attachments to: spam@eku.edu  In the unlikely event it is a legitimate email, we will let you know.
By working together and remaining vigilant against email threats, we can help safeguard our university community's sensitive information, protect against cyber threats, and uphold the integrity and trustworthiness of our academic institution.
 
Remember: When it comes to email security, your vigilance is our strongest defense.