{"id":6353,"date":"2020-03-26T21:59:40","date_gmt":"2020-03-26T21:59:40","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6353"},"modified":"2021-04-09T22:01:20","modified_gmt":"2021-04-09T21:01:20","slug":"email-security-education-top-two-trends","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends","title":{"rendered":"Email Security Education: Top Two Trends"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p><em>Please note: For privacy reasons, the identity of the hacked accounts in the examples used for this blog have been changed or hidden.<\/em><\/p>\n<p>Email remains the key way cybercriminals get into your business. It\u2019s also the productivity tool most businesses rely on to get jobs done. With around 68% of email traffic within organizations believed to be spam or malicious in nature<sup>i<\/sup>, it\u2019s crucial to understand email attacks and tactics to combat these threats. Understanding cyber threats also puts managed services providers (MSPs) in a position to educate customers and provide them with tactics to educate their employees. Today, we look at the top threats we\u2019ve seen for email so far this year.<\/p>\n<h3><b>Trend 1: Phishing continues to dominate<\/b><\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div>\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<div class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-media paragraph--view-mode--default\">\n<div class=\"field field--name-field-paragraph-image field--type-image field--label-hidden field--item\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\" alt=\"Paypal scam image\" width=\"282\" height=\"292\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>Phishing attacks have dominated the email security landscape with 93%<sup>ii<\/sup>\u00a0of breaches resulting from phishing attacks and pretexting, and 84%<sup>iii<\/sup>\u00a0of social attacks involving phishing emails. Looking at the top threats we\u2019ve seen so far, it\u2019s likely this will continue into 2020.<\/p>\n<p>Cybercriminals use this tactic, because it works. These campaigns are carefully developed to trick users into believing the sender is legitimate and prompt them to click on links and provide information such as credit card details.<\/p>\n<p>PayPal\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/how-spot-phishing-email-survivors-guide\" target=\"_blank\" rel=\"noopener\">phishing emails<\/a>\u00a0are still making the rounds. Hackers pretend to be PayPal with the aim of getting users to confirm their personal details. In the example, the email looks legitimate from a glance. But, if you take a closer look at the recipient, notice the sender is not a standard address. Hovering over the \u201cLog In\u201d link also shows it\u2019s not a legitimate PayPal URL. Another popular campaign going around is Apple phishing emails. In our example the hackers are trying to retrieve sensitive billing information from recipients.<\/p>\n<p>The top three tips users can employ to verify the legitimacy of emails of this nature, are:<\/p>\n<ul>\n<li>Look at the email \u201cFrom\u201d field<\/li>\n<li>Hover over the links within these emails (e.g. \u201cAccess my account\u201d) to ensure it redirects to a secured link (\u201chttps:\u201d and not \u201chttp:\u201d)<\/li>\n<li>Look at the language. These emails are normally crafted to create a sense of panic or urgency to act in the recipient.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-media paragraph--view-mode--default\">\n<div class=\"field field--name-field-paragraph-image field--type-image field--label-hidden field--item\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email2.jpg?itok=-PyDTqOR\" alt=\"Apple scam email\" width=\"352\" height=\"240\" \/><\/div>\n<\/div>\n<\/div>\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div>\n<div class=\"sidebar-width-40\"><\/div>\n<div class=\"blog-section-content\">\n<h3><b>Trend 2: Malicious email attachments\u00a0<\/b><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div>\n<div class=\"sidebar-width-40\">\n<div class=\"field field--name-field-sidebar field--type-entity-reference-revisions field--label-hidden field--item\">\n<div class=\"paragraph-align-right pull-right paragraph paragraph--type--blog-media paragraph--view-mode--default\">\n<div class=\"field field--name-field-paragraph-image field--type-image field--label-hidden field--item\"><img loading=\"lazy\" decoding=\"async\" class=\"img-responsive\" src=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%203.jpg?itok=TPNA0iqi\" alt=\"Shipping Scam\" width=\"291\" height=\"346\" \/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"blog-section-content\">\n<p>Emails with malicious email attachments are designed to get viruses, malware, Trojans, and more onto their victim\u2019s computer\u2014and ultimately into the company\u2019s network, so they can either destroy data or steal information. Some of these threats can even enable hackers access to take control of a user\u2019s computer. As such, they pose a serious threat to businesses.<\/p>\n<p>Cybercriminals use different techniques to cloak malware in file attachments with the intent of tricking email scanning technologies and users. They typically send attachments with email content that convinces users to believe it\u2019s legitimate.\u00a0 In this example, the hackers use Maersk\u2014one of the world\u2019s largest logistics companies\u2014to try to infiltrate a Maersk customer\u2019s account by prompting the user to download shipping documents.<\/p>\n<p>Initially, the HTML attachment seems legitimate. It\u2019s also a commonly used file type. While many users may recognize that .EXE and .PDF files are potentially malicious, many won\u2019t think twice about opening an HTML attachment. However, HTML attachments are often used to deliver malware code to endpoints through embedded JavaScript. There is also an uptick in cybercriminals using HTML attachments to embed URL redirects that aim to trick antivirus scanning software or deliver the recipient to non-legitimate web pages. Once again, users should hover over the links to ensure it redirects to a secure URL. In the case of attachments, industry experts advise to first save the attachment to a downloads folder from where the true file type can be viewed. Finally, a generic greeting should also spark concern\u2014legitimate companies often address the recipient by name.<\/p>\n<h3><b>Reducing your risk<\/b><\/h3>\n<p>Three things you can start doing today to help reduce your risk and that of your customers are:<\/p>\n<ol>\n<li>Practice strong in-house security\u2014including patching, putting up firewalls, running backup, and adding a professional email security solution. It also includes investing in advanced\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\">endpoint protection<\/a>. Make sure to monitor for threats with advanced threat detection tools and use a password management tool.<\/li>\n<li>Help customers establish and maintain a culture of security.<\/li>\n<li>Teach users how to spot malicious emails. Share simple tips like the ones we discussed above\u2014check the URLs in email to ensure it redirects to legitimate web pages, be on the lookout for malicious email attachments, and save the attachment to a downloads folder from where the file type can be viewed first before opening it. File types such as .JS, .EXE, .COM, .PIF, .SCR, .HTA, .vbs, .wsf, .jse, or .jar are malicious file types you shouldn\u2019t open, though as we\u2019ve seen above, HTML files can also be malicious.<\/li>\n<\/ol>\n<p>One malicious email can cause a lot of damage to you and your customer\u2019s businesses. Employing\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security?promo=blog\" target=\"_blank\" rel=\"noopener\">professional-grade email protection<\/a>\u00a0to prevent malware from getting into yours\u2014and your customers\u2019\u2014networks, can help stop and mitigate damage by:<\/p>\n<ul>\n<li>Defending against cyberattacks that infiltrate through email-borne threats<\/li>\n<li>Giving users greater control and visibility over email flow<\/li>\n<li>Protecting intellectual property and business data<\/li>\n<li>Boosting uptime and increase productivity<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>Try\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail-assure\/trial?utm_medium=website&amp;utm_source=direct&amp;utm_campaign=ma-glbl-t-mb-blog-2019-05-14&amp;promo=blog\" target=\"_blank\" rel=\"noopener\">SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure<\/a>\u00a0Free for 30 days<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><em>Mia Thompson is product marketing manager, Mail Assure, at SolarWinds MSP.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><u><strong>Sources<\/strong><\/u><\/p>\n<p>i\u00a0<a class=\"ext\" href=\"https:\/\/www.fireeye.com\/offers\/rpt-email-threat-report.html\" target=\"_blank\" rel=\"noopener noreferrer\">Get One Step Ahead of Email Threats<\/a>,\u00a0FireEye\u00a0(Accessed February 2020).<\/p>\n<p>ii\u00a0<a class=\"ext\" href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/DBIR_2018_Report_execsummary.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2018 Data Breach Investigations Report<\/a>, Verizon\u00a0(Accessed February 2020).<\/p>\n<p>iii\u00a0<a class=\"ext\" href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2019-data-breach-investigations-report-emea.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2019 Data Breach Investigations Report<\/a>, Verizon\u00a0(Accessed January 2020).<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6353","post","type-post","status-publish","format-standard","hentry","topic-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Email Security Education: Top Two Trends - N-able<\/title>\n<meta name=\"description\" content=\"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Email Security Education: Top Two Trends - N-able\" \/>\n<meta property=\"og:description\" content=\"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T21:59:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T21:01:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\" \/>\n<meta name=\"author\" content=\"Mia Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mia Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\"},\"author\":{\"name\":\"Mia Thompson\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\"},\"headline\":\"Email Security Education: Top Two Trends\",\"datePublished\":\"2020-03-26T21:59:40+00:00\",\"dateModified\":\"2021-04-09T21:01:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\"},\"wordCount\":915,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\",\"articleSection\":[\"Mail\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\",\"name\":\"Email Security Education: Top Two Trends - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\",\"datePublished\":\"2020-03-26T21:59:40+00:00\",\"dateModified\":\"2021-04-09T21:01:20+00:00\",\"description\":\"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage\",\"url\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\",\"contentUrl\":\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Email Security Education: Top Two Trends\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce\",\"name\":\"Mia Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g\",\"caption\":\"Mia Thompson\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Email Security Education: Top Two Trends - N-able","description":"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends","og_locale":"it_IT","og_type":"article","og_title":"Email Security Education: Top Two Trends - N-able","og_description":"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.","og_url":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-26T21:59:40+00:00","article_modified_time":"2021-04-09T21:01:20+00:00","og_image":[{"url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA","type":"","width":"","height":""}],"author":"Mia Thompson","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"Mia Thompson","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends"},"author":{"name":"Mia Thompson","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce"},"headline":"Email Security Education: Top Two Trends","datePublished":"2020-03-26T21:59:40+00:00","dateModified":"2021-04-09T21:01:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends"},"wordCount":915,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA","articleSection":["Mail"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends","url":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends","name":"Email Security Education: Top Two Trends - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage"},"thumbnailUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA","datePublished":"2020-03-26T21:59:40+00:00","dateModified":"2021-04-09T21:01:20+00:00","description":"Continuing our email security education series, find out the top threats we\u2019ve seen for email so far this year, and how to combat them.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#primaryimage","url":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA","contentUrl":"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/styles\/three_quarters_page\/public\/2020-03\/email%201_0.jpg?itok=S405lYVA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/email-security-education-top-two-trends#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/it\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Email Security Education: Top Two Trends"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/bc38305467dc98bb09bc55bea775f1ce","name":"Mia Thompson","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b6a6ab02ed6aac5138ddb30544154dc40aa39952b4b2da4149452b494638e3bb?s=96&d=mm&r=g","caption":"Mia Thompson"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=6353"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/6353\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=6353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}