Introduction: The Importance of End User Email Security
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hello and welcome to end user email. Security course
00:05
for this course, you need absolutely no prerequisites whatsoever. This course is meant for all kinds of beginners and people who want to learn more about end user in and security topics.
00:20
My name is Milton strategy. I will be your instructor for this course. I'm currently working is I t consultant. Have 25 years of experience in I. T. And I have been writing is 80 journalists and reviewer for nine years.
00:34
I have also be 90 specialists insecurity for eight years and in my free time I like to cook can enjoy plus a while.
00:44
Um,
00:46
so, um is for supplementary materials for this course there are
00:51
pretty much none except quiz,
00:54
Uh, that you should take after listening to old watching all the videos in this course. It is my suggestion that you take this quiz seriously as you need nine out of 12 questions that quiz to answer correctly in order to pass.
01:11
Um,
01:12
um,
01:15
this is all about supplementary materials. And as their target audience, it's meant for pretty much anybody using emails for work or privately. That means if you're working as intern, if your student if you're
01:30
just the PC owner who wants to learn more about email security
01:36
or if you work for a company or corporation. So if your individual contributor or a manager what you could learn here, unless you're right, especially is can be very useful for you.
01:49
In this course, you will be able to learn about the importance of end user email security. Then how can cybercriminals use emails, too?
02:05
Breach your security. Whether is your private security or your corporate security.
02:09
Then, if you're working for a corporation, there is a short lesson explaining who is responsible and what are the responsibilities of people in the company regarding email security.
02:24
And finally, I will give you some examples on how toe achieve and how to reach good email security, whether it's for your
02:34
personal use or for your corporate use.
02:38
So first, we're going to start with the whole idea off. Why these email security is so important.
02:46
So net for protection so protection. If you're working in a company, and if your company has reasonably good the I T Security Department, they have reached the network protection level that is pretty much Impenetrable for anybody except very, very
03:05
capable and resourceful hackers.
03:08
So most of cyber criminals today are shifting their attention towards and users as they're less if it all protected.
03:20
Um, most of the companies still spend more like 4/5 off their I T security budget to the server protection and network protection, leaving the end users and their emails unprotected.
03:38
Um,
03:39
in year 2017 almost 2/3 of successful cyber attacks have been initiated or performed in whole were the end user BC
03:50
and taking control over PCs. The easiest way to do why mount were inserted in emails. This is the reason why email securities are important.
04:00
I think that also four out of five successful attacks through the end user PC is done. Even more of that is than, uh, using some kind of email breach,
04:18
on the other hand, and users, uh,
04:23
and everybody off us is and user at one point in time, even if you're an administrator is still using your PC as an end user,
04:31
Um,
04:32
people are just not taking I t security seriously.
04:36
So 63% of breaches in World week or generic password
04:43
then most of the users think that there
04:49
enough of high tech tools, especially their work for a company they think. OK, the people, they must have installed all these stools,
04:58
and I'm 100% protected, which is absolutely not the case
05:03
and off course infecting your PC, especially why email is still the easiest way to break security.
05:14
And let's talk about more about how end users don't take. I t Security is seriously
05:19
so. In the research done by University of Luxembourg here in Europe, 43.5% of friend of people on the street that were approached by the people working for the this
05:34
university gave away their password if they were given a chocolate bar in the once, which is almost half
05:44
people, so almost every second person.
05:46
Well, if you give them trucked it, bar that gilder the prosperity. If hacker gets your password to get in your PC and
05:55
the damages them,
05:57
So why is this so important? So disclosing your passport is like giving the way your house keys to a stranger for a couple of hours. Basically, you give them your keys, they can make a copy,
06:10
and, uh,
06:11
and that's it. And they don't even I have to make a copy. They just need to access your account. Now you say Okay, they meet me randomly in the street. There is no way they know my account.
06:24
Well, if they do it in front off
06:27
corporate building,
06:29
they can assume that everybody on the building has the same domain name. And if they look at your name tag, they will know your name. So they probably easily get to your user name. And if they have the passwords, they just get in.
06:45
So using simple or generic password is equivalent to leaving your house unlocked when you leave. This is very important. So if you if you just used
06:56
passport, that is your name and your date of birth,
07:00
This is something that cybercriminals will break into very easily. This is these are the things they tried first. Detroit, your name, your last name your names off your family members,
07:15
their birthdates, your birth dates. And these are things that can be easily today in, In, in, in the ear, ALF, Social networks.
07:24
These things can be easily found.
07:29
So in this video, you have learned basically wise email security so important
07:36
so and users, and their email is more and more targets of cyber attacks.
07:43
Um,
07:45
most of people they don't understand their role in i t. Security there.
07:50
There is a way of thinking that is
07:55
difficult for majority of population, that there are tools like anti virus and anti malware. And these are enough to protect you from any kind off cyber attack, which is absolutely not the truth.
08:09
And passport is the weakest link in the whole scheme,
08:15
and people giving away, for example, their passport and most of us are using the Web email. So if they know your email address and your passport, they can use your email to further, for example, to propagate Mauer
08:31
or most of the people have the same user name and password for their PC, as they have for the email account,
08:39
so they can also enter your PC. So these things are simply something you
08:45
you have to take care off, and this is what you have learned in this.
08:50
Listen
Up Next
Instructed By
Similar Content