Reduce Phishing Attacks and Collaborate More Securely with EShare

The latest: "A cyber espionage campaign is targeting national security think tanks and academic institutions in the US in what's believed to be an intelligence gathering operation" ... the mechanism used is email: "...spear-phishing attacks using fake emails with malicious attachments attempts to deliver [...] malware".

Why email? Despite recent advances in collaboration platforms, a majority of enterprise users still depend on email for communication and sharing. And there are all kinds of opportunities for trickery in email...

e-Share - OneDrive

The above phishing attack is designed to look like it comes from Microsoft OneDrive.

Examining the URLs and domains reveals it to be questionable - but some number of users who receive it will definitely click on it. And that's why OneDrive, Dropbox and other cloud file storage and sharing systems are so frequently blocked by large or regulated companies.

Deploying eShare Trusted Sharing or Secure Mail Gateway helps protect users and recipients from phishing attacks.

For starters, the eShare service is always fully re-branded including your logo, colors and subdomain. Recipients will recognize these details and know it's ok to share and collaborate.


The link to the shared content will also use the same sub-domain.


Of course you can also use our fine-grained controls to further control the experience. Meanwhile your security team will continue to block unknown domains, including the cloud file storage services, to keep users and their data safe.

Once you adopt this approach, you can train your internal users to ignore anything that isn't from the official domain of important partners & vendors.

In addition to deploying Trusted Sharing, we recommend the following best practices for

secure collaboration... via email or any other platform!

• Define and deploy uniform sharing policies that are designed around real world use cases

• Deploy file sharing tools that integrate directly with email, collaboration and/or other end-user applications including mobile

• Use tools that promote file access without giving the recipient a copy

• Ensure trace-ability of information via audit, watermarking and/or encryption as appropriate

• Deploy and integrate data leakage protection (DLP) services to scan email for sensitive attachments and apply additional policies

We'd love to see examples of phishing attempts you've seen in the wild - feel free to comment below, or register for a demo to chat with our experts...

Bill Fletcher

Get the latest from eShare

By continuing, you agree to receive emails and other promotions from eshare agree to our Privacy Policy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Better collaboration.
Higher productivity.
Better employee and client engagement.

Transform the way you collaborate. Contact eShare to get started.

Schedule a Demo