Part #7: What Can a Malicious Email Do?

Subscribers:
79,800
Published on ● Video Link: https://www.youtube.com/watch?v=f2PAs_I267Y



Duration: 10:09
27,432 views
112


Watch all the episodes here: https://www.checkpoint.com/security-admins-guide-to-secure-remote-workforce/

The seventh episode explores the possible consequences of malicious emails, and how the rapid adoption of cloud mailboxes and productivity applications has changed the rules, creating more opportunities for hackers than ever before. We expose recent schemes uncovered by our Check Point Research (CPR) group, and take you through one of the most interesting stories we uncovered – the Florentine Banker Group.

In the episode we take a look at the latest in email driven attacks including:
• Phishing - These days phishing emails involve very sophisticated social engineering techniques that are designed to exploit vulnerabilities, both in systems and – especially – in human beings.
• Account Takeover - These attacks aim to steal users’ credentials in order to access their account and steal sensitive information, money, or to intercept private communications.
• Malware - Malware attacks can range from a seemingly innocent resume file that’s sent to HR, and up to an invoice file that’s sent to accounts payable.
• Data leakage - Employees can leak sensitive data, intentionally or unintentionally, and this can cost organizations a great deal of money.

Download the infographic: https://www.checkpoint.com/downloads/products/recent-trends-in-email-security-infographic.pdf




Other Videos By Check Point Software


2020-10-21Assessing Terraform Templates with CloudGuard Posture
2020-10-20R81 Unified Cyber Security Platform Feature Highlight Part I
2020-10-20R81 Unified Cyber Security Platform Feature Highlight Part II
2020-10-20Part #8 Teaser: 5 Must-Have Protections for Office 365 and G Suite
2020-10-19Privilege Escalation via Lambda – Attack and Investigation Series
2020-10-15Threat Hunting with SandBlast Agent
2020-10-15Check Point Corporate Access – The Easiest Way to Deploy Zero Trust Network Access
2020-10-15Check Point's Secure Access Service Edge (SASE) - Secure Access for Remote Users & Branches
2020-10-14The next decade: opportunity in uncertain times with futurist Yahli Admati
2020-10-14Cloud CheckMe - Instant Assessment for Cloud
2020-10-13Part #7: What Can a Malicious Email Do?
2020-10-13Amazon Prime Day 2020 and the Best Ways to Deal with the Hackers
2020-10-06Protecting Sensitive Data For Six Million Residents In Region Lazio, Italy
2020-10-06Master Mentalist, Lior Suchard, Featured Guest Speaker at Check Point SECURE Cloud
2020-10-04Part #6 Teaser: 5 Principles for Choosing the Right Mobile Security Solution
2020-10-01Talking iTech: Hacking the Brain with Prof. Moran Cerf
2020-10-01Check Point’s CMO, Peter Alexander Previews Check Point SECURE Cloud 2020
2020-09-28Part #5 Teaser: The New and Dangerous Wave of Mobile Threats
2020-09-24Brazilian CIO Talks Through His Check Point Decision: Scale, Economics and Control
2020-09-24Check Point Protects Branch Office Microsoft Azure Internet and SaaS Applications from Cyber Attacks
2020-09-24#InstaHack: How Researchers Were Able to Take Over the Instagram App Using a Malicious Image