250 likes | 275 Views
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them. Karsten Chearis Sales Engineer. 1 minute 40 seconds median time-to-open malicious email. Verizon 2 016 Data Breach Investigations Report (DBIR). 91% of all incidents start with a phish.
E N D
Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer
1 minute 40 seconds median time-to-open malicious email Verizon 2016 Data Breach Investigations Report (DBIR)
91% of all incidents start with a phish Wired 2015
Think Your Employees are Alert Enough to Stop Them? Confidential |
You are susceptible to email-borne attacks if…. You use email as a key business application You have certain letters in your domain name You accept resumes on your website You have a team of people in finance You have a profile Your life is deemed interesting enough to be on You run Windows…or any other OS
You don’t even need to know how to code…Crimeware as a Service - CaaS
Occasionally the Attacks Hit the General Media WannaCry? But usually they don’t
Vector: Phishing attack with malicious URL Threat: Entering credentials Target: Random mass-mailing
Vector: Phishing email with attachment Threat: Opening the document and activating malicious code Target: Targeted mailing
Business Email CompromiseWhalingWire transferW-2 Fraud Who Says Attacks Need to Involve Malware?
Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority
Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority
Vector: Email attack from the inside using a hacked email account Threat: Impersonating employees Target: Spreading the attack internally
Are Users Part of the Solution or Part of the Problem? • The Compromised Insider • The Careless Insider • The Malicious Insider
Herd alertness helps, but… Confidential |
Can we do more with technology? - YES! Confidential |
Cyber Resiliency Secure Gateway - Continuity - Independent Archive - Backup & Recovery - Anti-virus / malware - Anti-spam - Reputation analysis Comprehensive protection, simply achieved in the cloud Mimecast Email Security Suite Targeted Threat Protection URL Attachment Impersonation Internal Emails
ContinueYou need to continue to work while the issue is resolved ProtectYou need the technology that provides the best possible multi-layered protection RemediateYou need to get back to the last known good state Cyber Resilience Confidential |