SlideShare a Scribd company logo
Using Return Path Data to Protect Your Brand
Security Breakout Session
Brian Westnedge, Sr. Director of Client Services
Agenda
•  Email fraud trends and impact
•  The power of data: email threat intelligence
•  The Return Path Data Cloud
•  Tactics used by cybercriminals today
•  Unite against email fraud: tips for defending your customers, brand, and
bottom line
•  Questions
Email Fraud Trends
& Impact
Email Delivers Business Value…
Increases
Customer Loyalty
Boosts
Revenue
Reduces
Operating Costs
…But Its Impact Is Being Eroded
5 out of 6 big
companies
are targeted with
phishing attacks
Phishing costs brands
worldwide $4.5 billion
each year
RSA identifies
a phishing attack
every minute
Email fraud has
up to a 45%
conversion rate
Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm
$4.5 B 1 MIN 5/6 45%
Phishing Leads To – Revenue Losses
•  Reduced trust in brand:
•  Subscribers don’t know what to trust
•  Reduced effectiveness of email
•  ISPs don’t know what to trust
Customers are 42% less likely to
interact with a brand after being
phished or spoofed.
Phishing Leads To – Unwanted Media Attention
“If you boil the jobs down of IT security
professionals, they are ultimately tasked with
protecting the brand… If you have a breach,
research suggests that 60% of your customers will
think about moving and 30% actually do.”
Bryan Littlefair
Global Chief Information Security Officer
Aviva
Phishing Leads To – Remediation Costs
Fraud Losses Malware Infection Investigation Remediation
Can You Spot a
Spoof?
Anatomy Of A
Phishing Email
to: You <you@yourdomain.com>
from: Phishing Company <phishingcompany@spoof.com>
subject: Unauthorized login attempt
Dear Customer,
We have recieved noticed that you have recently
attempted to login to your account from an unauthorized
device.
As a saftey measure, please visit the link below to
update your login details now:
http://www.phishingemail.com/updatedetails.asp
Once you have updated your details your account will be
secure from further unauthorized login attempts.
Thanks,
The Phishing Team
1 attachment
Making an email
look legitimate by
spoofing the
company name in
the “Display Name”
field.
Tricking email
servers into
delivering the email
to the inbox by
spoofing the
“envelope from”
address hidden in
the technical header
of the email.
Including logos,
company terms,
and urgent
language in the body
of the email.
Making an email
appear to come from
a brand by using a
legitimate company
domain, or a domain
that looks like it in
the “from” field.
Creating convincing
subject lines to drive
recipients to open
the message.
Including links to
malicious websites
that prompt users to
give up
credentials
Including
attachments
containing malicious
content.
From: service@paypal.com <paypal@service.com>
From: PayPal <paypal@e.paypal.co.uk>
The Power of the
Right Data
Knowledge Is Your Best Defense
•  We know there is no silver bullet.
•  But defense starts with understanding.
•  Data is the key to that understanding.
Breadth, Depth, and Speed
Contactually Molto ParibusGetAirHelp
Message Finder UnsubscriberOrganizer
EMAIL THREAT
DATA
· Consumer inbox data
· Email delivery data
· Authentication results
· Message level data
· SPAM trap & complaints data
EMAIL THREAT
INTELLIGENCE
· Domain-spoofing alerts
· Brand-spoofing intelligence
· Suspicious activity map
· Fraudcaster URL feed
· Sender Score: IP reputation
Email Fraud: Primary Attack Vectors
Domain Spoofing
(from domains owned by the brand)
Brand Spoofing
(from domains outside the brand’s control)
phish@company.com company@phish.com
30% of Attacks Spoof Domains You Own
30% Domain
Spoofing
•  Active Emailing Domains
•  Non-Sending Domains
•  Defensively-Registered
Domains
70% Brand
Spoofing
•  Cousin Domains
•  Display Name Spoofing
•  Subject Line Spoofing
•  Email Account Spoofing
Source: Return Path / APWG White Paper, 2014
Unite Against
Email Fraud
Tips for defending your customers, your brand, and
your bottom line.
Leading Companies Fighting Email Fraud
DMARC (Domain-based Message Authentication Reporting &
Conformance):
•  Technical specification created to help reduce the potential for email-
based abuse (www.dmarc.org)
•  Prevents domain-based spoofing by blocking fraudulent activity
appearing to come from domains under your control
•  Provides threat reporting mechanism (aggregate and forensic data)
#1: Authenticate Your Email
“Simply put, the DMARC standard works.
In a blended approach to fight email fraud, DMARC
represents the cornerstone of technical controls
that commercial senders can implement today to
rebuild trust and retake the email channel for
legitimate brands and consumers.”
Edward Tucker
Head of Cyber Security
Her Majesty’s Revenue & Customs
•  Addressing the 70% of email attacks that spoof your brand using
domains your company does not own requires email threat
intelligence.
•  Get visibility into all types of email threats targeting you today.
#2: Leverage Email Threat Intelligence
•  The reality is, some attacks are always going to get through.
•  The more prepared your customers are, the better.
•  Create an educational website
•  Include anti-fraud language within your legitimate email
•  In the event of an attack, warn your customers immediately
#3: Educate Your Customers
•  Engage with Brand Protection teams to make the business case.
•  Create a sense of urgency.
•  Communicate the risks that result from not taking action:
•  Email fraud destroys brand reputation and erodes customer loyalty
•  Email fraud thwarts email marketing effectiveness
•  Email fraud negatively impacts revenue
#4: Raise Awareness with Top Executives
Learn More
www.returnpath.com/StopEmailFraud
Twitter: @StopEmailFraud
New: Download the Email Threat
Intelligence report at
bit.ly/EmailThreatIntel
Ad

More Related Content

What's hot (16)

Their Inbox, Your Responsibility
Their Inbox, Your ResponsibilityTheir Inbox, Your Responsibility
Their Inbox, Your Responsibility
Net Atlantic
 
Email marketing
Email marketingEmail marketing
Email marketing
Rishab Gupta
 
TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES
Tinuiti
 
Vision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email MarketingVision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email Marketing
davidsmerdon
 
Building a World Class Email Preference Centre
Building a World Class Email Preference CentreBuilding a World Class Email Preference Centre
Building a World Class Email Preference Centre
Silverpop
 
Email Marketing and MailChimp
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimp
Mickey Mellen
 
Key Email Marketing Actions 2010
Key Email Marketing Actions 2010Key Email Marketing Actions 2010
Key Email Marketing Actions 2010
Silverpop
 
Perfect Your Email Marketing
Perfect Your Email MarketingPerfect Your Email Marketing
Perfect Your Email Marketing
Net Atlantic
 
Welcome Email Best Practices Silverpop
Welcome Email Best Practices SilverpopWelcome Email Best Practices Silverpop
Welcome Email Best Practices Silverpop
Silverpop
 
Aloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best PracticesAloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best Practices
Silverpop
 
Busting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale LangleyBusting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale Langley
Adestra
 
Return Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path
 
eDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch PresentationeDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch Presentation
MediaPost
 
Email Marketing Best Practices
Email Marketing Best PracticesEmail Marketing Best Practices
Email Marketing Best Practices
BullsEye Internet Marketing
 
Power of Relationships
Power of RelationshipsPower of Relationships
Power of Relationships
Scott K. Wilder
 
Adma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David SmerdonAdma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David Smerdon
davidsmerdon
 
Their Inbox, Your Responsibility
Their Inbox, Your ResponsibilityTheir Inbox, Your Responsibility
Their Inbox, Your Responsibility
Net Atlantic
 
TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES TOP 5 EMAIL MARKETING MISTAKES
TOP 5 EMAIL MARKETING MISTAKES
Tinuiti
 
Vision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email MarketingVision 6 David Smerdon Evolve Your Email Marketing
Vision 6 David Smerdon Evolve Your Email Marketing
davidsmerdon
 
Building a World Class Email Preference Centre
Building a World Class Email Preference CentreBuilding a World Class Email Preference Centre
Building a World Class Email Preference Centre
Silverpop
 
Email Marketing and MailChimp
Email Marketing and MailChimpEmail Marketing and MailChimp
Email Marketing and MailChimp
Mickey Mellen
 
Key Email Marketing Actions 2010
Key Email Marketing Actions 2010Key Email Marketing Actions 2010
Key Email Marketing Actions 2010
Silverpop
 
Perfect Your Email Marketing
Perfect Your Email MarketingPerfect Your Email Marketing
Perfect Your Email Marketing
Net Atlantic
 
Welcome Email Best Practices Silverpop
Welcome Email Best Practices SilverpopWelcome Email Best Practices Silverpop
Welcome Email Best Practices Silverpop
Silverpop
 
Aloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best PracticesAloha Welcome Email & Unsubscribe Best Practices
Aloha Welcome Email & Unsubscribe Best Practices
Silverpop
 
Busting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale LangleyBusting out of the junk folder: Dale Langley
Busting out of the junk folder: Dale Langley
Adestra
 
Return Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San FranciscoReturn Path World Tour Keynote - San Francisco
Return Path World Tour Keynote - San Francisco
Return Path
 
eDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch PresentationeDataSource Sponsored Lunch Presentation
eDataSource Sponsored Lunch Presentation
MediaPost
 
Adma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David SmerdonAdma 2009 Vision 6 David Smerdon
Adma 2009 Vision 6 David Smerdon
davidsmerdon
 

Viewers also liked (12)

Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)
cacds_ukraine
 
Advanced Manufacturing Careers
Advanced Manufacturing CareersAdvanced Manufacturing Careers
Advanced Manufacturing Careers
SmarTrax
 
RESUME np
RESUME npRESUME np
RESUME np
Abdulmutajar Mudjahirin
 
InternDesignDay_0823
InternDesignDay_0823InternDesignDay_0823
InternDesignDay_0823
Vincent Agoe
 
Surrealismo
SurrealismoSurrealismo
Surrealismo
Michelle Bouvier
 
How to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop upHow to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop up
coseanonans
 
Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)
cacds_ukraine
 
Return Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path
 
Antes do cinema
Antes do cinemaAntes do cinema
Antes do cinema
filmotecaforum
 
Resident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant RenewalsResident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant Renewals
Multifamily Insiders
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
talha ijaz
 
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
Docker, Inc.
 
Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)Newsletter 01 12-2015(38-22) (1)
Newsletter 01 12-2015(38-22) (1)
cacds_ukraine
 
Advanced Manufacturing Careers
Advanced Manufacturing CareersAdvanced Manufacturing Careers
Advanced Manufacturing Careers
SmarTrax
 
InternDesignDay_0823
InternDesignDay_0823InternDesignDay_0823
InternDesignDay_0823
Vincent Agoe
 
How to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop upHow to remove net.portalsepeti.com pop up
How to remove net.portalsepeti.com pop up
coseanonans
 
Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)Bulletin cacds 15_10-2015(35-19)
Bulletin cacds 15_10-2015(35-19)
cacds_ukraine
 
Return Path World Tour Keynote - New York
Return Path World Tour Keynote - New YorkReturn Path World Tour Keynote - New York
Return Path World Tour Keynote - New York
Return Path
 
Resident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant RenewalsResident Retention Rehab - The Cure For Reluctant Renewals
Resident Retention Rehab - The Cure For Reluctant Renewals
Multifamily Insiders
 
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
The Good, the Bad and the Ugly of Networking for Microservices by Mathew Lodg...
Docker, Inc.
 
Ad

Similar to Using Return Path Data to Protect Your Brand: Security Breakout Session - LA (20)

Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Return Path
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
Salesforce Partners
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab
 
Gone Phishing
Gone Phishing Gone Phishing
Gone Phishing
stratospherenetworks
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
Shankar Suman
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
PHISHING PROTECTION
 PHISHING PROTECTION PHISHING PROTECTION
PHISHING PROTECTION
KaterynaPetrova4
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
Tarun Arora
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
TIKAJ
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
Symantec
 
weDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern EraweDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern Era
weDMARC
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYCUsing Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Chi...
Return Path
 
How Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email AuthenticationHow Cybercriminals Cheat Email Authentication
How Cybercriminals Cheat Email Authentication
Return Path
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - LondonUsing Return Path Data to Protect Your Brand: Security Breakout Session - London
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Return Path
 
Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)Marketing Cloud - Partner Office Hour (August 18, 2015)
Marketing Cloud - Partner Office Hour (August 18, 2015)
Salesforce Partners
 
7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise7 top tips to protect your business from BEC [infographic] By Stellarise
7 top tips to protect your business from BEC [infographic] By Stellarise
Elena Tatarenkova
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
Claranet UK
 
Protect your domain with DMARC
Protect your domain with DMARCProtect your domain with DMARC
Protect your domain with DMARC
Contactlab
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
Neuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt LtdNeuailes Global Technologies Pvt Ltd
Neuailes Global Technologies Pvt Ltd
Shankar Suman
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
AbdullaFatiya3
 
GoDMARC - Block Email Phishing
GoDMARC - Block Email PhishingGoDMARC - Block Email Phishing
GoDMARC - Block Email Phishing
Tarun Arora
 
Dmarc is your savior
Dmarc is your saviorDmarc is your savior
Dmarc is your savior
TIKAJ
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
Symantec
 
weDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern EraweDMARC: Reinventing Email Security for the Modern Era
weDMARC: Reinventing Email Security for the Modern Era
weDMARC
 
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Using Return Path Data to Protect Your Brand: Security Breakout Session - Sao...
Return Path
 
Ad

More from Return Path (17)

Green Eggs & Spam
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path
 
Return Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path
 
Return Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path
 
Return Path World Tour Keynote - Paris
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path
 
World Tour Keynote Presentation - London
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path
 
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Return Path
 
Increase Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best TimeIncrease Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best Time
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao PauloLittle Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Return Path
 
Green Eggs & Spam
Green Eggs & SpamGreen Eggs & Spam
Green Eggs & Spam
Return Path
 
Return Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao PauloReturn Path World Tour Keynote - Sao Paulo
Return Path World Tour Keynote - Sao Paulo
Return Path
 
Return Path World Tour Keynote - Sydney
Return Path World Tour Keynote - SydneyReturn Path World Tour Keynote - Sydney
Return Path World Tour Keynote - Sydney
Return Path
 
Return Path World Tour Keynote - Paris
Return Path World Tour Keynote - ParisReturn Path World Tour Keynote - Paris
Return Path World Tour Keynote - Paris
Return Path
 
World Tour Keynote Presentation - London
World Tour Keynote Presentation - LondonWorld Tour Keynote Presentation - London
World Tour Keynote Presentation - London
Return Path
 
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Deliverability Rates are Falling - Learn the Reasons Why and How to Prevent It.
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - San Fran...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LALittle Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - LA
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYCLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - NYC
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - ChicagoLittle Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Little Data, Big Decisions: The Path to Data Enlightenment Keynote - Chicago
Return Path
 
Increase Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best TimeIncrease Open Rates by Sending at the Best Time
Increase Open Rates by Sending at the Best Time
Return Path
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Return Path
 
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao PauloLittle Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Little Data, Big Decisions: The Path to Data Enlightenment Keynote -Sao Paulo
Return Path
 

Recently uploaded (20)

Modern_Distribution_Presentation.pptx Aa
Modern_Distribution_Presentation.pptx AaModern_Distribution_Presentation.pptx Aa
Modern_Distribution_Presentation.pptx Aa
MuhammadAwaisKamboh
 
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnTemplate_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
cegiver630
 
chapter 4 Variability statistical research .pptx
chapter 4 Variability statistical research .pptxchapter 4 Variability statistical research .pptx
chapter 4 Variability statistical research .pptx
justinebandajbn
 
VKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptxVKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptx
Vinod Srivastava
 
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
Simran112433
 
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptxISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
pankaj6188303
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
Classification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptxClassification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptx
wencyjorda88
 
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
gmuir1066
 
Principles of information security Chapter 5.ppt
Principles of information security Chapter 5.pptPrinciples of information security Chapter 5.ppt
Principles of information security Chapter 5.ppt
EstherBaguma
 
Customer Segmentation using K-Means clustering
Customer Segmentation using K-Means clusteringCustomer Segmentation using K-Means clustering
Customer Segmentation using K-Means clustering
Ingrid Nyakerario
 
Decision Trees in Artificial-Intelligence.pdf
Decision Trees in Artificial-Intelligence.pdfDecision Trees in Artificial-Intelligence.pdf
Decision Trees in Artificial-Intelligence.pdf
Saikat Basu
 
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
ThanushsaranS
 
computer organization and assembly language.docx
computer organization and assembly language.docxcomputer organization and assembly language.docx
computer organization and assembly language.docx
alisoftwareengineer1
 
Minions Want to eat presentacion muy linda
Minions Want to eat presentacion muy lindaMinions Want to eat presentacion muy linda
Minions Want to eat presentacion muy linda
CarlaAndradesSoler1
 
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptxPerencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
PareaRusan
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdfIAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
mcgardenlevi9
 
VKS-Python Basics for Beginners and advance.pptx
VKS-Python Basics for Beginners and advance.pptxVKS-Python Basics for Beginners and advance.pptx
VKS-Python Basics for Beginners and advance.pptx
Vinod Srivastava
 
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbbEDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
JessaMaeEvangelista2
 
Modern_Distribution_Presentation.pptx Aa
Modern_Distribution_Presentation.pptx AaModern_Distribution_Presentation.pptx Aa
Modern_Distribution_Presentation.pptx Aa
MuhammadAwaisKamboh
 
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnTemplate_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
Template_A3nnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnnn
cegiver630
 
chapter 4 Variability statistical research .pptx
chapter 4 Variability statistical research .pptxchapter 4 Variability statistical research .pptx
chapter 4 Variability statistical research .pptx
justinebandajbn
 
VKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptxVKS-Python-FIe Handling text CSV Binary.pptx
VKS-Python-FIe Handling text CSV Binary.pptx
Vinod Srivastava
 
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
1. Briefing Session_SEED with Hon. Governor Assam - 27.10.pdf
Simran112433
 
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptxISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
ISO 9001_2015 FINALaaaaaaaaaaaaaaaa - MDX - Copy.pptx
pankaj6188303
 
Ch3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendencyCh3MCT24.pptx measure of central tendency
Ch3MCT24.pptx measure of central tendency
ayeleasefa2
 
Classification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptxClassification_in_Machinee_Learning.pptx
Classification_in_Machinee_Learning.pptx
wencyjorda88
 
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
Adobe Analytics NOAM Central User Group April 2025 Agent AI: Uncovering the S...
gmuir1066
 
Principles of information security Chapter 5.ppt
Principles of information security Chapter 5.pptPrinciples of information security Chapter 5.ppt
Principles of information security Chapter 5.ppt
EstherBaguma
 
Customer Segmentation using K-Means clustering
Customer Segmentation using K-Means clusteringCustomer Segmentation using K-Means clustering
Customer Segmentation using K-Means clustering
Ingrid Nyakerario
 
Decision Trees in Artificial-Intelligence.pdf
Decision Trees in Artificial-Intelligence.pdfDecision Trees in Artificial-Intelligence.pdf
Decision Trees in Artificial-Intelligence.pdf
Saikat Basu
 
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
CTS EXCEPTIONSPrediction of Aluminium wire rod physical properties through AI...
ThanushsaranS
 
computer organization and assembly language.docx
computer organization and assembly language.docxcomputer organization and assembly language.docx
computer organization and assembly language.docx
alisoftwareengineer1
 
Minions Want to eat presentacion muy linda
Minions Want to eat presentacion muy lindaMinions Want to eat presentacion muy linda
Minions Want to eat presentacion muy linda
CarlaAndradesSoler1
 
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptxPerencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
Perencanaan Pengendalian-Proyek-Konstruksi-MS-PROJECT.pptx
PareaRusan
 
Digilocker under workingProcess Flow.pptx
Digilocker  under workingProcess Flow.pptxDigilocker  under workingProcess Flow.pptx
Digilocker under workingProcess Flow.pptx
satnamsadguru491
 
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdfIAS-slides2-ia-aaaaaaaaaaain-business.pdf
IAS-slides2-ia-aaaaaaaaaaain-business.pdf
mcgardenlevi9
 
VKS-Python Basics for Beginners and advance.pptx
VKS-Python Basics for Beginners and advance.pptxVKS-Python Basics for Beginners and advance.pptx
VKS-Python Basics for Beginners and advance.pptx
Vinod Srivastava
 
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbbEDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
EDU533 DEMO.pptxccccvbnjjkoo jhgggggbbbb
JessaMaeEvangelista2
 

Using Return Path Data to Protect Your Brand: Security Breakout Session - LA

  • 1. Using Return Path Data to Protect Your Brand Security Breakout Session Brian Westnedge, Sr. Director of Client Services
  • 2. Agenda •  Email fraud trends and impact •  The power of data: email threat intelligence •  The Return Path Data Cloud •  Tactics used by cybercriminals today •  Unite against email fraud: tips for defending your customers, brand, and bottom line •  Questions
  • 4. Email Delivers Business Value… Increases Customer Loyalty Boosts Revenue Reduces Operating Costs
  • 5. …But Its Impact Is Being Eroded 5 out of 6 big companies are targeted with phishing attacks Phishing costs brands worldwide $4.5 billion each year RSA identifies a phishing attack every minute Email fraud has up to a 45% conversion rate Source: http://www.emc.com/emc-plus/rsa-thought-leadership/online-fraud/index.htm $4.5 B 1 MIN 5/6 45%
  • 6. Phishing Leads To – Revenue Losses •  Reduced trust in brand: •  Subscribers don’t know what to trust •  Reduced effectiveness of email •  ISPs don’t know what to trust Customers are 42% less likely to interact with a brand after being phished or spoofed.
  • 7. Phishing Leads To – Unwanted Media Attention
  • 8. “If you boil the jobs down of IT security professionals, they are ultimately tasked with protecting the brand… If you have a breach, research suggests that 60% of your customers will think about moving and 30% actually do.” Bryan Littlefair Global Chief Information Security Officer Aviva
  • 9. Phishing Leads To – Remediation Costs Fraud Losses Malware Infection Investigation Remediation
  • 10. Can You Spot a Spoof?
  • 11. Anatomy Of A Phishing Email to: You <[email protected]> from: Phishing Company <[email protected]> subject: Unauthorized login attempt Dear Customer, We have recieved noticed that you have recently attempted to login to your account from an unauthorized device. As a saftey measure, please visit the link below to update your login details now: http://www.phishingemail.com/updatedetails.asp Once you have updated your details your account will be secure from further unauthorized login attempts. Thanks, The Phishing Team 1 attachment Making an email look legitimate by spoofing the company name in the “Display Name” field. Tricking email servers into delivering the email to the inbox by spoofing the “envelope from” address hidden in the technical header of the email. Including logos, company terms, and urgent language in the body of the email. Making an email appear to come from a brand by using a legitimate company domain, or a domain that looks like it in the “from” field. Creating convincing subject lines to drive recipients to open the message. Including links to malicious websites that prompt users to give up credentials Including attachments containing malicious content.
  • 13. The Power of the Right Data
  • 14. Knowledge Is Your Best Defense •  We know there is no silver bullet. •  But defense starts with understanding. •  Data is the key to that understanding.
  • 15. Breadth, Depth, and Speed Contactually Molto ParibusGetAirHelp Message Finder UnsubscriberOrganizer
  • 16. EMAIL THREAT DATA · Consumer inbox data · Email delivery data · Authentication results · Message level data · SPAM trap & complaints data EMAIL THREAT INTELLIGENCE · Domain-spoofing alerts · Brand-spoofing intelligence · Suspicious activity map · Fraudcaster URL feed · Sender Score: IP reputation
  • 17. Email Fraud: Primary Attack Vectors Domain Spoofing (from domains owned by the brand) Brand Spoofing (from domains outside the brand’s control) [email protected] [email protected]
  • 18. 30% of Attacks Spoof Domains You Own 30% Domain Spoofing •  Active Emailing Domains •  Non-Sending Domains •  Defensively-Registered Domains 70% Brand Spoofing •  Cousin Domains •  Display Name Spoofing •  Subject Line Spoofing •  Email Account Spoofing Source: Return Path / APWG White Paper, 2014
  • 19. Unite Against Email Fraud Tips for defending your customers, your brand, and your bottom line.
  • 21. DMARC (Domain-based Message Authentication Reporting & Conformance): •  Technical specification created to help reduce the potential for email- based abuse (www.dmarc.org) •  Prevents domain-based spoofing by blocking fraudulent activity appearing to come from domains under your control •  Provides threat reporting mechanism (aggregate and forensic data) #1: Authenticate Your Email
  • 22. “Simply put, the DMARC standard works. In a blended approach to fight email fraud, DMARC represents the cornerstone of technical controls that commercial senders can implement today to rebuild trust and retake the email channel for legitimate brands and consumers.” Edward Tucker Head of Cyber Security Her Majesty’s Revenue & Customs
  • 23. •  Addressing the 70% of email attacks that spoof your brand using domains your company does not own requires email threat intelligence. •  Get visibility into all types of email threats targeting you today. #2: Leverage Email Threat Intelligence
  • 24. •  The reality is, some attacks are always going to get through. •  The more prepared your customers are, the better. •  Create an educational website •  Include anti-fraud language within your legitimate email •  In the event of an attack, warn your customers immediately #3: Educate Your Customers
  • 25. •  Engage with Brand Protection teams to make the business case. •  Create a sense of urgency. •  Communicate the risks that result from not taking action: •  Email fraud destroys brand reputation and erodes customer loyalty •  Email fraud thwarts email marketing effectiveness •  Email fraud negatively impacts revenue #4: Raise Awareness with Top Executives
  • 26. Learn More www.returnpath.com/StopEmailFraud Twitter: @StopEmailFraud New: Download the Email Threat Intelligence report at bit.ly/EmailThreatIntel