Dating then and now
As emails are used to spread various pieces of malware, whether they are banking trojans, ransomware, adware, spyware or any other malicious piece of code designed to make somebodies day a nightmare, defending that front is a priority.It is a priority not just for companies but anybody that has access to an internet enabled device.It is also important to see who the sender is first before opening the email.If it sent from an address you are not in regular contact with it is advised not to open the email.
Despite their importance companies around the world have struggled to make them a secure platform free from viruses or malware (for the purposes of this article the words “virus” and “malware” are used interchangeably and are used to describe malicious code).Hackers want to steal data, often from some moral prerogative, rather they want to make a quick buck.Till this day email is the best-proven start point in order to make that quick buck. Despite the number of attack vectors, available email is easily used by both the experienced and inexperienced hacker. This is a massive majority considering the sheer amount of attack vectors available to hackers.