Part #7: What Can a Malicious Email Do?
Watch all the episodes here: https://www.checkpoint.com/security-admins-guide-to-secure-remote-workforce/
The seventh episode explores the possible consequences of malicious emails, and how the rapid adoption of cloud mailboxes and productivity applications has changed the rules, creating more opportunities for hackers than ever before. We expose recent schemes uncovered by our Check Point Research (CPR) group, and take you through one of the most interesting stories we uncovered – the Florentine Banker Group.
In the episode we take a look at the latest in email driven attacks including:
• Phishing - These days phishing emails involve very sophisticated social engineering techniques that are designed to exploit vulnerabilities, both in systems and – especially – in human beings.
• Account Takeover - These attacks aim to steal users’ credentials in order to access their account and steal sensitive information, money, or to intercept private communications.
• Malware - Malware attacks can range from a seemingly innocent resume file that’s sent to HR, and up to an invoice file that’s sent to accounts payable.
• Data leakage - Employees can leak sensitive data, intentionally or unintentionally, and this can cost organizations a great deal of money.
Download the infographic: https://www.checkpoint.com/downloads/products/recent-trends-in-email-security-infographic.pdf