WEBVTT 0:00:02.100000 --> 0:00:06.180000 Hello and welcome to this video on email-based threats. 0:00:06.180000 --> 0:00:10.440000 I'm Keith Bogart and I will be your instructor for this video course. 0:00:10.440000 --> 0:00:13.620000 So let's take a look in this course here in this video, the high-level 0:00:13.620000 --> 0:00:15.220000 things I'm going to talk about. 0:00:15.220000 --> 0:00:19.560000 So the intent of this video is really just to familiarize you with some 0:00:19.560000 --> 0:00:24.340000 common terms that go along with email -based threats, the types of threats 0:00:24.340000 --> 0:00:27.000000 that you might encounter in case you've never seen these before. 0:00:27.000000 --> 0:00:31.100000 So we're going to talk about what is spam, what's the definition of spam, 0:00:31.100000 --> 0:00:34.440000 what does spam look like, what's it meant to do. 0:00:34.440000 --> 0:00:37.920000 We're going to talk about this thing called malware, defining phishing, 0:00:37.920000 --> 0:00:42.100000 spearfishing, and then phishing up with some threat statistics. 0:00:42.100000 --> 0:00:46.800000 So this is just an intro and overall introduction to concepts related 0:00:46.800000 --> 0:00:52.760000 to various types of attacks that people can perpetuate using email. 0:00:52.760000 --> 0:00:56.540000 All right, so let's start with one that you probably have heard of before, 0:00:56.540000 --> 0:01:00.400000 if not, let's introduce you to it, which is spam. 0:01:00.400000 --> 0:01:04.940000 So spam to my knowledge is not an acronym, doesn't necessarily mean anything, 0:01:04.940000 --> 0:01:08.680000 but it is unsolicited email that you didn't really want to get. 0:01:08.680000 --> 0:01:13.060000 Now spam email is one of two categories. 0:01:13.060000 --> 0:01:16.780000 It could be junk mail, could be completely harmless, like just a typical 0:01:16.780000 --> 0:01:18.320000 advertising campaign. 0:01:18.320000 --> 0:01:21.860000 Maybe you went and bought some shoes from some company as part of, you 0:01:21.860000 --> 0:01:24.780000 know, paying with your credit card that asked if you could give them your 0:01:24.780000 --> 0:01:28.120000 email address unwittingly you said, sure, why not? 0:01:28.120000 --> 0:01:30.480000 And all of a sudden you're getting tons of emails from them. 0:01:30.480000 --> 0:01:31.620000 That's called spam. 0:01:31.620000 --> 0:01:35.260000 You don't want those emails, it's harmless, but it's junk. 0:01:35.260000 --> 0:01:39.320000 Now the type of spam we are concerned about is malicious spam. 0:01:39.320000 --> 0:01:44.100000 Now malicious spam is designed with the intent to try to get you to divulge 0:01:44.100000 --> 0:01:48.100000 some personally identifiable information about yourself. 0:01:48.100000 --> 0:01:51.260000 If they can do that, then they can use that against you. 0:01:51.260000 --> 0:01:53.760000 So now we're talking about malicious spam. 0:01:53.760000 --> 0:02:00.480000 So let's look at some examples of spam, both harmless as well as malicious. 0:02:00.480000 --> 0:02:04.360000 So email messages that you did not ask for from senders that you don't 0:02:04.360000 --> 0:02:07.780000 know. I'm sure you've all gotten this, an email and you're like, what 0:02:07.780000 --> 0:02:08.700000 the heck is this? 0:02:08.700000 --> 0:02:11.460000 I never signed up for flight training lessons. 0:02:11.460000 --> 0:02:14.300000 You're wondering where did this come from? 0:02:14.300000 --> 0:02:18.060000 And the sender might just be some garbled email that you don't even recognize. 0:02:18.060000 --> 0:02:21.420000 You can't even tell what company it came from. 0:02:21.420000 --> 0:02:26.040000 Or unsolicited commercial emails sent in bulk, often to a purchased or 0:02:26.040000 --> 0:02:29.360000 stolen mailing list that contain your address. 0:02:29.360000 --> 0:02:33.220000 Once again, the common thread here is you're getting stuff you don't want. 0:02:33.220000 --> 0:02:36.200000 Now in these first two examples, it's not going to hurt you. 0:02:36.200000 --> 0:02:38.940000 I mean, it might fill up your email inbox, but it's not going to damage 0:02:38.940000 --> 0:02:42.660000 anything. Let's take a look at the last two that are intentionally designed 0:02:42.660000 --> 0:02:46.220000 to cause you pain and misery. 0:02:46.220000 --> 0:02:49.260000 So we've got counterfeit messages from reliable senders that attempt to 0:02:49.260000 --> 0:02:53.300000 trick you into supplying your personal information. 0:02:53.300000 --> 0:02:58.880000 OK, so an example of this would be something that looks like it's coming 0:02:58.880000 --> 0:03:02.000000 from a sender that you know, like something that looks like it's coming 0:03:02.000000 --> 0:03:05.380000 from your bank, or it looks like it's coming from your employer. 0:03:05.380000 --> 0:03:09.700000 And they're trying to trick you into supplying your social security number, 0:03:09.700000 --> 0:03:13.960000 or a credit card number, or your birth date, or a username and password. 0:03:13.960000 --> 0:03:17.300000 But in this case, you look at the source and say, oh, I know who this 0:03:17.300000 --> 0:03:21.460000 is. I have some personal or business dealings with that. 0:03:21.460000 --> 0:03:24.680000 But in reality, it did not really come from them. 0:03:24.680000 --> 0:03:27.320000 It's a counterfeit. 0:03:27.320000 --> 0:03:30.740000 And misleading messages from people you know whose email accounts have 0:03:30.740000 --> 0:03:32.440000 been hacked. So this is a lot more personal. 0:03:32.440000 --> 0:03:36.000000 This is an email that looks like it's coming from your uncle, or your 0:03:36.000000 --> 0:03:37.760000 aunt, or your best friend. 0:03:37.760000 --> 0:03:40.420000 It actually has a source address from them. 0:03:40.420000 --> 0:03:44.440000 But if you look at it closely, a lot of times the source address might 0:03:44.440000 --> 0:03:46.140000 look like it came from them. 0:03:46.140000 --> 0:03:49.420000 But there might be one or two little tweaks in there that you say, well, 0:03:49.420000 --> 0:03:53.580000 wait a second. My aunt doesn't have a doesn't have her name and then a 0:03:53.580000 --> 0:03:56.140000 one at gmail.com. 0:03:56.140000 --> 0:03:57.580000 It's it's just her name. 0:03:57.580000 --> 0:03:59.000000 There's something here that's not quite right. 0:03:59.000000 --> 0:04:01.500000 So it looks like it's coming from someone that you know. 0:04:01.500000 --> 0:04:04.620000 So this is all examples of spam. 0:04:04.620000 --> 0:04:08.040000 Other types of threats that could be contained in email is something called 0:04:08.040000 --> 0:04:13.160000 malware. So malware is short for malicious software. 0:04:13.160000 --> 0:04:15.760000 That's where the came term came from. 0:04:15.760000 --> 0:04:21.940000 And this is malware is software that is actually designed to damage, destroy 0:04:21.940000 --> 0:04:26.780000 your computer, maybe spy on you, maybe even take control of your computer 0:04:26.780000 --> 0:04:28.560000 or your laptop or your smartphone. 0:04:28.560000 --> 0:04:32.700000 So in the context of email based threats, now what we're talking about 0:04:32.700000 --> 0:04:37.220000 are emails that either in the body of the email has some malware embedded 0:04:37.220000 --> 0:04:42.260000 in it, or the email is trying to get you to click on something which will 0:04:42.260000 --> 0:04:46.160000 download malware and harm your computer. 0:04:46.160000 --> 0:04:51.700000 So malware at a high level is designed to compromise your computer functions, 0:04:51.700000 --> 0:04:55.480000 steal your data, bypass your access control, and other where it wise just 0:04:55.480000 --> 0:04:56.980000 cause you a lot of pain. 0:04:56.980000 --> 0:05:00.560000 Now there's a lot of different terms for malware. 0:05:00.560000 --> 0:05:02.640000 So let's talk about some of these just at a high level. 0:05:02.640000 --> 0:05:04.560000 So you're familiar with what they are. 0:05:04.560000 --> 0:05:07.600000 Ransomware, probably the worst. 0:05:07.600000 --> 0:05:11.960000 You don't want to be a subject to this. 0:05:11.960000 --> 0:05:16.520000 Ransomware is a form of malware that basically holds your computer hostage. 0:05:16.520000 --> 0:05:19.340000 It holds it captive while demanding a ransom. 0:05:19.340000 --> 0:05:23.840000 So in ransomware, once you've downloaded this and you've installed it 0:05:23.840000 --> 0:05:26.020000 unwittingly, you didn't know that's what you were doing. 0:05:26.020000 --> 0:05:30.000000 You might see some message that, hey, your hard drive has now been encrypted. 0:05:30.000000 --> 0:05:33.240000 You have no more access to anything on your hard drive, any of your files, 0:05:33.240000 --> 0:05:35.820000 folders, they're all encrypted. 0:05:35.820000 --> 0:05:39.340000 And the only way you can get them de-encrypted is if you supply your credit 0:05:39.340000 --> 0:05:41.640000 card number to the attacker. 0:05:41.640000 --> 0:05:45.560000 Or a lot of times what they're doing these days is because credit card 0:05:45.560000 --> 0:05:48.500000 numbers can be forged or you can retract it. 0:05:48.500000 --> 0:05:51.400000 They're asking you to purchase Bitcoin or put something into their Bitcoin 0:05:51.400000 --> 0:05:55.500000 wallet. Because Bitcoin is a lot more untraceable than credit card numbers 0:05:55.500000 --> 0:06:00.060000 are. Or sometimes they'll actually just lock up your entire computer. 0:06:00.060000 --> 0:06:03.360000 Once ransomware is installed, all of a sudden a message will come up on 0:06:03.360000 --> 0:06:07.080000 your desktop screen and you have no access to anything. 0:06:07.080000 --> 0:06:12.120000 Your entire computer is locked up unless you pay the ransom. 0:06:12.120000 --> 0:06:15.400000 So companies have paid millions of dollars sometimes to get out of that 0:06:15.400000 --> 0:06:18.500000 situation. So a rootkit. 0:06:18.500000 --> 0:06:20.360000 This is also another type of malware. 0:06:20.360000 --> 0:06:24.980000 This designed to actually remotely access or control your computer without 0:06:24.980000 --> 0:06:27.880000 you actually detecting that that's going on. 0:06:27.880000 --> 0:06:30.700000 So once a rootkit has been installed, it's possible for the person who 0:06:30.700000 --> 0:06:36.140000 created it to actually remotely execute some of your files, to steal your 0:06:36.140000 --> 0:06:40.000000 information, to modify your system configuration, to lock you out. 0:06:40.000000 --> 0:06:41.840000 Or even to alter your software. 0:06:41.840000 --> 0:06:46.240000 All of it is behind the scenes buried deep, deep, deep into the operating 0:06:46.240000 --> 0:06:52.180000 system and you can't even detect that it's going on. 0:06:52.180000 --> 0:06:56.100000 Spiware is a type of malware that's designed to intentionally spy on you 0:06:56.100000 --> 0:06:58.080000 to be able to tell what you're doing. 0:06:58.080000 --> 0:07:05.160000 So for example, one type of spyware is where once it's installed, it keeps 0:07:05.160000 --> 0:07:07.880000 track of every click you have on your keyboard. 0:07:07.880000 --> 0:07:10.540000 And then it sends it back to a remote server or something like that. 0:07:10.540000 --> 0:07:15.520000 So everything you type, it keeps a record of that and sends it back and 0:07:15.520000 --> 0:07:18.180000 then people at their leisure can say, Oh, right here he was typing in 0:07:18.180000 --> 0:07:20.380000 his username up and there's his password. 0:07:20.380000 --> 0:07:21.300000 Now I've got it. 0:07:21.300000 --> 0:07:23.300000 That's an example of spyware. 0:07:23.300000 --> 0:07:25.720000 So what else do we have under the category of malware? 0:07:25.720000 --> 0:07:29.040000 Well, we also have a Trojan horse. 0:07:29.040000 --> 0:07:34.060000 Now a Trojan horse is more of a delivery mechanism of some of these other 0:07:34.060000 --> 0:07:35.400000 types of malware. 0:07:35.400000 --> 0:07:40.000000 A Trojan horse, if you remember in Greek mythology, the Trojan horse was 0:07:40.000000 --> 0:07:47.020000 delivered as a gift to a city that was under attack, a city that had closed 0:07:47.020000 --> 0:07:50.800000 off its walls, closed off its doors, and the attackers built this giant 0:07:50.800000 --> 0:07:53.420000 wooden horse called a Trojan horse. 0:07:53.420000 --> 0:07:56.260000 They delivered it to the city as a gift. 0:07:56.260000 --> 0:07:59.580000 The city brought it inside their walls and unbeknownst to them, inside 0:07:59.580000 --> 0:08:03.500000 the Trojan horse were a bunch of warriors and enemies that came spilling 0:08:03.500000 --> 0:08:06.300000 out and attacked and subdued the city. 0:08:06.300000 --> 0:08:11.840000 So in the case of malware, a Trojan horse is basically some type of software 0:08:11.840000 --> 0:08:14.360000 that you've downloaded that looks legitimate. 0:08:14.360000 --> 0:08:17.860000 It looks, you know, maybe you went to a website intentionally to download 0:08:17.860000 --> 0:08:21.660000 some software. You clicked on something believing that what you're downloading 0:08:21.660000 --> 0:08:27.060000 was a legitimate video, a legitimate software file, the name of the file, 0:08:27.060000 --> 0:08:28.140000 look legitimate. 0:08:28.140000 --> 0:08:31.720000 But what makes it a Trojan horse is that the actual body, the contents 0:08:31.720000 --> 0:08:34.600000 of the file are not what you expected. 0:08:34.600000 --> 0:08:39.320000 Inside that file that looks okay actually has malicious software inside 0:08:39.320000 --> 0:08:45.420000 of it. So a Trojan horse is a delivery mechanism for malware. 0:08:45.420000 --> 0:08:49.940000 Then we also have viruses and worms. 0:08:49.940000 --> 0:08:52.840000 Now when I first learned about viruses and worms, I thought, what's the 0:08:52.840000 --> 0:08:55.440000 difference? They sound very, very similar to each other. 0:08:55.440000 --> 0:08:57.480000 So they are. They're very similar. 0:08:57.480000 --> 0:09:01.840000 They're designed to do a wide variety of things to your computer. 0:09:01.840000 --> 0:09:06.280000 A lot of times, corrupt or damage software, corrupt or damage files make 0:09:06.280000 --> 0:09:08.000000 things inaccessible to you. 0:09:08.000000 --> 0:09:14.320000 So what really makes viruses and worms different from each other is how 0:09:14.320000 --> 0:09:17.060000 they get implemented. 0:09:17.060000 --> 0:09:21.280000 In other words, a virus is something typically that you downloaded. 0:09:21.280000 --> 0:09:24.720000 You didn't do it intentionally, but it came along with a program or there 0:09:24.720000 --> 0:09:28.000000 was an email that had an attachment and you unwittingly clicked on the 0:09:28.000000 --> 0:09:32.020000 attachment. So in order for the virus to actually be activated and start 0:09:32.020000 --> 0:09:37.060000 working, you as the user of that laptop per PC have to click on something. 0:09:37.060000 --> 0:09:38.620000 You have to open something. 0:09:38.620000 --> 0:09:42.920000 You have to run some application and that triggers or activates the virus 0:09:42.920000 --> 0:09:44.840000 to do its damage. 0:09:44.840000 --> 0:09:50.240000 Similarly, the only way a virus can actually spread is once again, if 0:09:50.240000 --> 0:09:54.540000 you do something, if you unwittingly forward on an email that has a virus 0:09:54.540000 --> 0:09:55.800000 as an attachment. 0:09:55.800000 --> 0:10:00.100000 If you send somebody a copy of a file that embedded in that file has the 0:10:00.100000 --> 0:10:05.280000 virus, but the virus only spreads because you did something to push it 0:10:05.280000 --> 0:10:06.980000 to somebody else. 0:10:06.980000 --> 0:10:10.240000 Not that you knew what you were doing, but that's how it works. 0:10:10.240000 --> 0:10:14.620000 Now a worm, when a worm is triggered, it does basically the same type 0:10:14.620000 --> 0:10:15.520000 of thing as a virus. 0:10:15.520000 --> 0:10:18.760000 The main thing that makes a worm different from a virus is the worm has 0:10:18.760000 --> 0:10:22.260000 the capability of spreading all on its own. 0:10:22.260000 --> 0:10:24.060000 Now think about this for a second. 0:10:24.060000 --> 0:10:29.000000 A lot of programs that you have stored in your laptop per PC have a list 0:10:29.000000 --> 0:10:30.100000 of contacts in it, right? 0:10:30.100000 --> 0:10:34.260000 For example, email programs have locally stored a variety of email addresses 0:10:34.260000 --> 0:10:37.180000 of all your friends and family and people that you've ever emailed right 0:10:37.180000 --> 0:10:38.800000 there in your laptop. 0:10:38.800000 --> 0:10:43.280000 So a worm would be an example of a malware that gets a hold of that file 0:10:43.280000 --> 0:10:47.020000 and then all by itself without you doing anything, just start sending 0:10:47.020000 --> 0:10:51.760000 out spam emails to all the people in your contact lists and each one of 0:10:51.760000 --> 0:10:55.580000 those spam emails has a copy of the worm inside of it. 0:10:55.580000 --> 0:10:59.260000 So once the worm was triggered, once again, probably because you clicked 0:10:59.260000 --> 0:11:02.480000 on something or you opened something, but once it was triggered, you stand 0:11:02.480000 --> 0:11:07.280000 back and now the worm is not only doing harm to your system, it's replicating 0:11:07.280000 --> 0:11:09.260000 itself all by itself. 0:11:09.260000 --> 0:11:11.480000 You didn't have to send the email to your friend. 0:11:11.480000 --> 0:11:14.280000 You didn't have to manually send the file to your friend. 0:11:14.280000 --> 0:11:18.940000 The worm discovered on its own where your friends and coworkers are typically 0:11:18.940000 --> 0:11:22.320000 based on their email addresses are locally stored in your system and to 0:11:22.320000 --> 0:11:24.320000 start replicating all by itself. 0:11:24.320000 --> 0:11:29.300000 So that's what makes a worm even more insidious than a virus. 0:11:29.300000 --> 0:11:34.900000 Now some other types of malware are phishing emails. 0:11:34.900000 --> 0:11:41.440000 Now, unlike the previous malware we talked about in the last slide, those 0:11:41.440000 --> 0:11:45.220000 were all examples of malware that once it gets onto your computer, once 0:11:45.220000 --> 0:11:54.060000 it's there locally on your system, it starts wrecking havoc. 0:11:54.060000 --> 0:11:55.680000 Phishing is not like that. 0:11:55.680000 --> 0:11:58.640000 Phishing is an example of an email, once again we're all talking about 0:11:58.640000 --> 0:12:04.080000 email based attack here, that like spam looks like it came from a legitimate 0:12:04.080000 --> 0:12:08.600000 entity, but in reality it did not come from a legitimate entity. 0:12:08.600000 --> 0:12:10.120000 It looks like it came from your boss. 0:12:10.120000 --> 0:12:13.280000 It looks like it came from your bank, but in reality it didn't really 0:12:13.280000 --> 0:12:18.480000 come from them. Now the intent of phishing is not to actually download 0:12:18.480000 --> 0:12:20.520000 malware onto your system. 0:12:20.520000 --> 0:12:21.640000 That's not what they want. 0:12:21.640000 --> 0:12:25.720000 People who create emails that are phishing emails, they're intended to 0:12:25.720000 --> 0:12:29.960000 try to trick you into believing that they are somebody that they are not. 0:12:29.960000 --> 0:12:33.740000 So you'll have a level of confidence and security with them and you will 0:12:33.740000 --> 0:12:38.000000 provide them personally identifiable information about yourself, which 0:12:38.000000 --> 0:12:40.300000 they can then use to attack you. 0:12:40.300000 --> 0:12:43.600000 Like they want you to provide your username and password or your social 0:12:43.600000 --> 0:12:48.280000 security number or your credit card number. 0:12:48.280000 --> 0:12:53.220000 So in general a phishing email can be recognized typically because when 0:12:53.220000 --> 0:12:56.260000 you read the body of the email, it's very generic. 0:12:56.260000 --> 0:12:59.800000 Now was that the body of that email could have gone to anybody? 0:12:59.800000 --> 0:13:02.520000 It wasn't necessarily addressed just to you. 0:13:02.520000 --> 0:13:06.560000 It could start out by saying hello customer or this email is going out 0:13:06.560000 --> 0:13:10.160000 to all of our customers or this email is meant for all of our employees. 0:13:10.160000 --> 0:13:15.420000 Very generic body and then somewhere in that body is asking you to reply 0:13:15.420000 --> 0:13:19.640000 and give some personal information about yourself. 0:13:19.640000 --> 0:13:24.060000 Or maybe it's asking you to click on a particular link and if you did 0:13:24.060000 --> 0:13:27.540000 click on that link, that would take you to a website that is controlled 0:13:27.540000 --> 0:13:32.060000 by the malicious actor which in turn will once again try to get you to 0:13:32.060000 --> 0:13:35.640000 give up your personally identifiable information. 0:13:35.640000 --> 0:13:38.800000 Very common entry point for hackers. 0:13:38.800000 --> 0:13:43.740000 Now another subcategory of phishing is something we called spear phishing. 0:13:43.740000 --> 0:13:49.040000 Spear phishing is an example of where the attacker in advance knows something 0:13:49.040000 --> 0:13:52.260000 about you. Now it might be as simple as they know what your real name 0:13:52.260000 --> 0:13:53.860000 is and they know your email. 0:13:53.860000 --> 0:13:58.460000 So they can start their email by saying, hey Bob or hi Sally or hey long 0:13:58.460000 --> 0:14:00.100000 time no here Sue. 0:14:00.100000 --> 0:14:04.520000 So the email starts out looking like it's being directed to you like a 0:14:04.520000 --> 0:14:05.600000 spearfish right? 0:14:05.600000 --> 0:14:08.600000 You're going right towards that particular fish you're aiming for. 0:14:08.600000 --> 0:14:12.220000 But the overall goal is exactly the same in spear phishing. 0:14:12.220000 --> 0:14:18.520000 Trying to trick you into divulging your personal identifiable information. 0:14:18.520000 --> 0:14:21.360000 Spear phishing is just a little bit more tricky because it looks like 0:14:21.360000 --> 0:14:25.620000 not only did it come from someone you know like your bank, your boss, 0:14:25.620000 --> 0:14:28.560000 your mom, but in the body the email is actually addressed to you. 0:14:28.560000 --> 0:14:32.220000 It's got your name in there somewhere. 0:14:32.220000 --> 0:14:35.700000 So let's just finish up this video here by talking about some threats 0:14:35.700000 --> 0:14:41.980000 to statistics so you can understand just how prevalent email based threats 0:14:41.980000 --> 0:14:47.400000 are. So as is you know this is now a couple of years old here but back 0:14:47.400000 --> 0:14:52.140000 in 2017 76% of organizations said they had experienced phishing attacks. 0:14:52.140000 --> 0:14:56.640000 That is a lot and it's just increasing in frequency. 0:14:56.640000 --> 0:14:59.580000 As a matter of fact Symantec you may have heard of that company. 0:14:59.580000 --> 0:15:04.520000 They're very famous for creating virus filters and virus definition software. 0:15:04.520000 --> 0:15:11.760000 Back in 2018 they reported that over half over half of all email is spam 0:15:11.760000 --> 0:15:18.480000 which is insane. 0:15:18.480000 --> 0:15:21.620000 Symantec also reported once again over two years ago that the average 0:15:21.620000 --> 0:15:26.260000 user was receiving 16 malicious emails per month. 0:15:26.260000 --> 0:15:29.400000 Now keep in mind here by malicious emails we're not talking about spam 0:15:29.400000 --> 0:15:32.760000 that's sent from your grocery store that's unwanted. 0:15:32.760000 --> 0:15:36.120000 This just junk mail kind of irritating but not going to hurt anything 0:15:36.120000 --> 0:15:39.760000 malicious here. We're talking about email that is intentionally either 0:15:39.760000 --> 0:15:44.900000 has some malicious software embedded in it or is maliciously trying to 0:15:44.900000 --> 0:15:49.140000 trick you into giving up some information so they can harm you with the 0:15:49.140000 --> 0:15:51.260000 information that you've given to them. 0:15:51.260000 --> 0:15:55.700000 Alright so 16 emails a month that are malicious in nature and that was 0:15:55.700000 --> 0:15:56.740000 over two years ago. 0:15:56.740000 --> 0:16:02.140000 You can bet it's a lot higher than that right now. 0:16:02.140000 --> 0:16:06.640000 And when it comes to malware when it comes to the Trojan horse when it 0:16:06.640000 --> 0:16:13.280000 comes to the worm the virus the root kit the ransomware 92% of it is delivered 0:16:13.280000 --> 0:16:19.760000 via email. So I hope you can see here why having some sort of protection 0:16:19.760000 --> 0:16:24.180000 against malicious emails having something that's scanning emails before 0:16:24.180000 --> 0:16:28.900000 they hit your system to see if that email is legitimate or not or contains 0:16:28.900000 --> 0:16:33.100000 malware can be a very useful tool. 0:16:33.100000 --> 0:16:37.000000 So thank you for watching this video and I hope you found it useful.