Professional Documents
Culture Documents
Email Security
Email Security
Table Of Contents
Introduction......................................................................................................................................................................................................... 3 How.To.Protect.Yourself. ....................................................................................................................................................................................... 4 . What.To.Do.If.You.Get.Hacked............................................................................................................................................................................... 5 The.Hackers.Life................................................................................................................................................................................................. 6 . Email.Is.Gold....................................................................................................................................................................................................... 7 How.An.Attack.Works............................................................................................................................................................................................ 8
*ATTENTION: EXTREMELY IMPORTANT OBLIGATORY LEGAL DISCLAIMER This guide is intended to serve as a resource on the topic of email security. It is not intended to be professional advice, nor is it a complete compendium of the information available in this area. The Rocket Science Group, LLC d/b/a MailChimp expressly disclaims any and all warranties about the information contained within. In sum, while we think this is an awesome guide on the topic, use of the information contained within the guide is entirely, completely, definitively, absolutely, positively, 100% at your own risk. If you have questions or need specific advice for your situation, please contact a knowledgeable professional.
Log.every.keystroke.you.type..The.software.that.records.the.keystrokes.is.even.built.to.show.fake.login.pages.for.financial.institutes. to.log.your.credentials. Steal.information.from.your.hard.drive..The.attacker.owns.your. machine.and.can.get.at.any.piece.of.data.they.want..Stealing.your. accounting.database.and.cracking.the.username.and.password. shouldnt.take.more.than.a.few.Google.searches. Use.your.system.to.send.SPAM..The.majority.of.SPAM.is.sent.through. systems.controlled.by.botnets..If.your.system.is.under.the.control.of. a.hacker,.they.can.send.hundreds.of.thousands.of.pieces.of.SPAM. from.your.system.without.you.ever.knowing.it.
3..To target your customers. Maybe.you.have.some.high-profile.clients.that. the.attacker.is.after..Maybe.a.client.is.listed.on.your.site.or.sent.an.issue. via.Twitter..Its.easy.to.figure.out.who.your.clients.are,.and.its.an.easily. accessible.entry.point.for.an.attack. 4..To target employees. A.hacker.can.easily.target.your.employees.using. social.media.and.direct.attacks..Its.easy.to.find.ways.to.get.at.your.employees,.like.using.family.members,.college.or.high-school.friends.found. through.Facebook..If.an.attacker.targets.one.of.your.employees,.he.can. gain.insight.into.your.business.practices.and.target.your.entire.company.
Email Is Gold
Email.addresses.are.extremely.valuable.in.todays.economy..Referencing. back.to.our.quick.calculation.in.the.introduction,.you.can.see.that.an. email.address.can.be.worth.a.lot.of.money.to.your.business..Our.identities,. important.accounts.and.vital.information.are.attached.to.email.addresses.. Chances.are.your.financial.institutions.use.your.email.address.as.your. username..Your.social.media.accounts,.like.Facebook.and.Twitter,.tie.to. your.email.address..Your.email.address.is.a.unique.identifierbut.more. importantly,.its.a.communication.mechanism..We.use.email.to.transmit. all.kinds.of.important.information,.and.we.use.email.more.and.more.each. day..Evil.hackers.want.the.email.accounts.for.various.reasons..This.is.just. a.small.list.of.some.stuff.they.might.be.after:
Hackers.have.found.that.companies.who.use.ESPs.generally.have. clean.lists..A.clean.list.means.fewer.bounces.and.potentially.an.engaged.list..And.that.means.the.list.will.deliver.to.the.inbox.and.have. a.higher.likelihood.of.clicks.and.opens. The.hacker.wants.your.email.addresses.to.send.your.subscribers.. malicious.stuff..Maybe.your.email.list.has.important.users.like.congress.members..If.they.can.trick.your.subscribers.into.clicking.links. and.visiting.bad.sites,.they.can.then.gain.access.to.machines.they. were.targeting. The.hacker.is.planning.a.much.larger.attack.and.is.just.harvesting. email.addresses. The.hacker.is.planning.to.resell.your.subscribers.
Know.that.lists.used.by.marketers.often.have.highly.engaged.readers.and. good.email.addresses..If.the.hacker.wanted.to.target.your.customers,. they.could.easily.imitate.your.campaign.content.and.trick.your.users.into. following.a.link.to.a.malicious.site..Chances.are,.the.engaged.readers.will. click.like.they.normally.would..The.list.is.valuable.to.you,.but.its.just.as. valuableif.not.more.soto.the.hacker... Theres.also.a.large.market.for.buying.and.selling.email.addresses..So. not.only.can.the.hacker.use.the.email.addresses.for.direct.attacks,.but. they.can.then.sell.the.addresses.to.a.list.broker.for.further.gain..Think. that.through.the.next.time.someone.approaches.you.about.selling.a.list chances.are.most.of.the.addresses.were.gathered.unethically.