• Cyber Safety
  • Posts
  • “Shadow Email Accounts: The Hidden Data Exfil Path”

“Shadow Email Accounts: The Hidden Data Exfil Path”

In partnership with

Introducing the first AI-native CRM

Connect your email, and you’ll instantly get a CRM with enriched customer insights and a platform that grows with your business.

With AI at the core, Attio lets you:

  • Prospect and route leads with research agents

  • Get real-time insights during customer calls

  • Build powerful automations for your complex workflows

Join industry leaders like Granola, Taskrabbit, Flatfile and more.

Employees Create Personal Accounts for Work Use

To bypass slow IT processes, staff spin up Gmail, ProtonMail, or Outlook accounts for quick client communication. These accounts fall outside your visibility and policies.

Sensitive Files Get Sent to Personal Inboxes

Reports, contracts, credentials — all forwarded “just to finish work at home.” Once data hits a personal inbox, encryption, DLP, and auditing disappear.

Cloud-Based Email is Hard to Govern

Even with SaaS security, rogue accounts used on unmanaged devices bypass protections. They live outside MDM, SIEM, and access logs — a blind spot by design.

Creativity + Science = Ads that perform

Join award-winning strategist Babak Behrad and Neurons CEO Thomas Z. Ramsøy for a strategic, practical webinar on what actually drives high-impact advertising today. Learn how top campaigns capture attention, build memory, and create branding moments that stick. It’s all backed by neuroscience, and built for real-world creative teams.

Forwarding Rules Are Used by Attackers Too

Once inside an inbox, attackers set up auto-forwarding to hidden destinations. Victims don’t notice, alerts don’t trigger, and exfiltration becomes routine.

Domain Lookalikes Trick Internal Users

fake-mycompany.co looks like mycompany.com. One wrong character, and confidential emails go to an attacker-controlled inbox. Domain fuzzing tools exploit muscle memory.

Email Controls Need to Expand Beyond Your Domain

It’s not enough to secure *@yourcompany.com. Policies must flag external domains, personal email use, and hidden forwarding. The threat is off-domain — but on your risk sheet.

All the stories worth knowing—all in one place.

Business. Tech. Finance. Culture. If it’s worth knowing, it’s in the Brew.

Morning Brew’s free daily newsletter keeps 4+ million readers in the loop with stories that are smart, quick, and actually fun to read. You’ll learn something new every morning — and maybe even flex your brain with one of our crosswords or quizzes while you’re at it.

Get the news that makes you think, laugh, and maybe even brag about how informed you are.