Skip to content

CloudTech is part of the TechForge Publications series

  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms
  • View All
  • AI News
  • The Block
  • Developer
  • Edge Computing News
  • IoT News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Sustainability News
  • Telecoms

TechForge

  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us
Subscribe
Subscribe
  • Search
  • News
  • Categories
    • Applications
      • Blockchain
      • Containers
      • Data Centres
      • Infrastructure as a Service
      • Platform as a Service
      • Software as a Service
      • Virtualisation
    • Companies
      • Alibaba Cloud
      • AWS
      • Google Cloud
      • Microsoft
    • Data & Analytics
    • Enterprise
      • Cloud Migration
      • Collaboration
      • Digital Transformation
      • Future Work
      • Hybrid Cloud
      • Private Cloud
      • Public Cloud
    • Industries
      • Banking & Finance
      • Healthcare
      • Public Sector
      • Retail & Consumer
      • Telecoms
    • Infrastructure
    • Interviews
    • IoT
    • Platforms
    • Privacy
    • Regulation & Government
    • Security
    • Sponsored Content
  • Events
  • Resources
    • All Resources
    • On-demand Webinars
    • Exclusive Videos
  • More
    • Advertise
    • Contact Us
    • About Us

Enterprise

Oliver Paterson, VIPRE: On email security in the era of hybrid working

James Bourne

1st December 2022

Share this story:

Tags:

Categories::

Enterprise
Future Work
Interviews
Security

With remote working the future for so many global workforces – or at least some kind of hybrid arrangement – is there an impact on email security we are all missing? Oliver Paterson, director of product management at VIPRE Security, believes so.

“The timeframe that people expect now for you to reply to things is shortened massively,” says Paterson. “This puts additional stress and pressure on individuals, which can then also lead to further mistakes. [Employees] are not as aware if they get an email with a link coming in – and they’re actually more susceptible to clicking on it.”

The cybercriminal’s greatest friend is human error, and distraction makes for a perfect bedfellow. The remote working calendar means that meetings are now held in virtual rooms, instead of face-to-face. A great opportunity for a quick catch up on a few emails during a spot of downtime, perhaps? It’s also a great opportunity for an attacker to make you fall for a phishing attack.

“It’s really about putting in the forefront there that email is the major first factor when we talk about data breaches, and anything around cyberattacks and ransomware being deployed on people’s machines,” Paterson says around education. “We just need to be very aware that even though we think these things are changing, [you] need to add a lot more security, methods and the tactics that people are using to get into your business is still very similar.

“The attacks may be more sophisticated, but the actual attack vector is the same as it was 10-15 years ago.”

This bears true in the statistics. The Anti-Phishing Working Group (APWG) found in its Phishing Activity Trends Report (pdf) in February that attacks hit an all-time high in 2021. Attacks had tripled since early 2020 – in other words, since the pandemic began. 

VIPRE has many solutions to this age-old problem, and the email security product side of the business comes primarily under Paterson’s remit. One such product is VIPRE SafeSend, which focuses on misaddressed emails and prevents data leakage. “Everyone’s sent an email to the wrong person at some point in their life,” says Paterson. “It just depends how serious that’s been.”

Paterson notes one large FMCG brand, where a very senior C-level executive had the same name as someone else in the business much lower down. Naturally, plenty of emails went to the wrong place. “You try and get people to be uber-careful, but we’ve got technology solutions to help with those elements as well now,” says Paterson. “It’s making sure that businesses are aware of that, then also having it in one place.”

Another part of the product portfolio is with EDR (endpoint detection and response). The goal for VIPRE is to ‘take the complexities out of EDR management for small to medium-sized businesses and IT teams.’ Part of this is understanding what organisations really want. 

The basic knowledge is there, as many organisational surveys will show. Take a study from the Enterprise Security Group (ESG) released in October in terms of ransomware preparedness. Respondents cited network security (43%), backup infrastructure security (40%), endpoint (39%), email (36%) and data encryption (36%) as key prevention areas. Many security vendors offer this and much more – but how difficult is it to filter out the noise?

“People understand they need an endpoint solution, and an email security solution. There’s a lot of competitors out there and they’re all shouting about different things,” says Paterson. “So it’s really getting down to the nitty gritty of what they actually need as a business. That’s where we at VIPRE try to make it as easy as possible for clients. 

“A lot of companies do EDR at the moment, but what we’ve tried to do is get it down to the raw elements that every business will need, and maybe not all the bells and whistles that probably 99% of organisations aren’t going to need,” Paterson adds.

“We’re very much a company that puts a lot of emphasis on our clients and partners, where we treat everyone as an individual business. We get a lot of comments [from customers] that some of the biggest vendors in there just treat them as a number.”

Paterson is speaking at the Cyber Security & Cloud Expo Global, in London on December 1-2 around the rising threat of ransomware, and how the security industry evolves alongside this threat. Having a multi-layered approach will be a cornerstone of Paterson’s message, and his advice to businesses is sound.

“Take a closer look at those areas, those threat vectors, the way that they are coming into the business, and make sure that you are putting those industry-level systems in place,” he says. “A lot of businesses can get complacent and just continue renewing the same thing over and over again, without realising there are new features and additions. Misdelivery of email is a massive one – I would say the majority of businesses don’t have anything in place for it.

“Ask ‘where are the risk areas for your business?’ and understand those more, and then make sure to put those protection layers in place to help with things like ransomware attacks and other elements.”

(Photo by Cytonn Photography on Unsplash)

Want to learn more about cybersecurity and the cloud from industry leaders? Check out Cyber Security & Cloud Expo taking place in Amsterdam, California, and London.

Explore other upcoming enterprise technology events and webinars powered by TechForge here.

About the Author

James Bourne

Writer

James has more than a decade of experience as a tech journalist, writer and editor, and served as Editor in Chief of TechForge Media between 2017 and 2021. James was named as one of the top 20 UK technology influencers by Tyto, and has also been cited by Onalytica, Feedspot and Zsah as an influential cloud computing writer.

Related

CISA issues guidance amid unconfirmed Oracle Cloud breach

21st April 2025

Trade tensions prompt European firms to rethink cloud strategies

21st April 2025

$100M IFC investment in sub-Saharan Africa data centres

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

11th April 2025

Join our Community

Subscribe now to get all our premium content and latest tech news delivered straight to your inbox

Click here

Popular

Cloud Computing

Oracle Cloud denies breach as hacker offers 6 million records for sale

4305 view(s)

Applications

Netflix countersues Broadcom over VMware patents

3086 view(s)

Cloud Computing

5 of the best: cloud technology training platforms

3057 view(s)

Infrastructure

Microsoft’s palm-sized chip brings practical quantum computing within reach

2467 view(s)
See all

Latest

View All Latest

Interviews

11th April 2025

Dr Mary Aiken, University of East London: The Intersection of technology and human behaviour in cybersecurity

Google unveils Cloud WAN and Gemini Tools to simplify app development Google Cloud Next 2025

Applications

10th April 2025

Google Cloud Next 25: AI, cloud, and WAN

Deutsche Telekom extends Google Cloud partnership through 2030

Cloud Computing

10th April 2025

Deutsche Telekom extends Google Cloud partnership through 2030

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Subscribe

Explore

  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy
  • About Us
  • Contact Us
  • Newsletter
  • Privacy Policy
  • Cookie Policy

Reach Our Audience

  • Advertise
  • Post a Press Release
  • Contact Us
  • Advertise
  • Post a Press Release
  • Contact Us

Categories

  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content
  • Applications
  • Companies
  • Data & Analytics
  • Enterprise
  • Industries
  • IoT
  • Infrastructure
  • Platforms
  • Sponsored Content

Other Publications

  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News
  • Explore All
  • AI News
  • Developer
  • IoT News
  • Edge Computing News
  • Marketing Tech
  • TechHQ
  • Tech Wire Asia
  • Telecoms
  • The Block
  • Sustainability News

CloudTech News is part of TechForge 

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Subscribe

All our premium content and latest tech news delivered straight to your inbox

Permissions(Required)
This field is for validation purposes and should be left unchanged.