![]() Inky isn’t an email client of its own but connects to three corporate email providers – Microsoft Exchange, Microsoft 365 (opens in new tab), and Google Workspace (opens in new tab). (Image credit: Inky) Inky: Interface and use The recipient will receive an email notification about the encrypted message, which they can view with Microsoft or Google credentials or by requesting a “magic link” from the sender. Just add the word to the subject line of an email and it's good to go. Inky uses 256-bit encryption to protect emails. You can encrypt all outgoing emails to keep data secure within your corporate network. The company claims a 99.7% accuracy for its analysis tool. Inky scans through every email attachment to detect malware (opens in new tab) and alert the recipient. If the targeted email recipient opens the attachment, they can unknowingly install malware capable of destroying or stealing data. The fast alerts give your IT department the opportunity to eliminate any account it deems compromised and prevent a potential cyber catastrophe.Ī common vector through which attackers break into a corporate network is by attaching malicious documents to an email. If an email suddenly doesn't match the model of a sender, Inky can flag it as a suspected impersonation attempt requiring a manual review. This platform builds behavior models of email senders within your organization using specific information like the display name, location, device type, and email client. Some email accounts may get compromised in the end but Inky still has tools to tackle threats coming from within. Though Inky tries as much as possible to detect phishing attempts, it's not absolutely perfect and neither are humans within an organization. It’s not perfect and may occasionally flag valid emails, but it offers solid protection compared to using an email provider’s default security tool. It cross-references multiple data points such as keywords and specific figures and uses pattern matching to discover sensitive information, e.g., credit card information and bank routing numbers. Inky uses a mix of detection tools to identify sensitive data within emails. You can also add a mandatory requirement to encrypt outgoing emails. For example, you can set Inky to flag an email for approval if it detects any suspicious link within it. IT admins can create custom rules from their Inky dashboard to define how Outbound Mail Protection will work for their teams. If it detects any, it flags it for approval by a chosen administrator or manager. ![]() To avoid this, Inky scans every outgoing email for sensitive content. Employees send many emails daily, and they can intentionally or unintentionally include sensitive information within them. Outbound emails need protection as much as inbound ones. It uses natural language processing (NLP) algorithms to identify emails that are likely forged and draws your attention to them. Luckily, Inky has a tool to tackle this problem. ![]() One of the most common phishing activities involves impersonating a service provider and a bank’s identity to send forged invoices and trick companies into paying them. When you encounter a flagged inbound email, you can click the "Report This Email" link to let your company's IT department investigate further. ![]() It's an effective way of educating users on real-world threats in their email inboxes. Click this link, and the Inky email assistant will show you what exactly is wrong with the flagged email. If you see a red banner, you'll also see a link that says "Details". These banners let you know what to click and what not to click to lessen your chances of falling victim to phishing attempts. If you integrate Inky with your email client (opens in new tab), every inbound email will have a grey banner (indicating nothing suspicious), a yellow banner (proceed with caution), or a red banner (danger). It doesn't only detect phishing attempts but also turns them into teaching sessions to prevent users from falling victim to a similar attempt in the future. To tackle phishing, Inky analyzes any inbound email and signals any suspicious behavior it detects with interactive banners that guide the users to take adequate actions. To the unaware, it refers to criminals impersonating an organization via email or any other means of communication to steal data. Phishing is the primary cause of data leaks in enterprises.
0 Comments
Leave a Reply. |