1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

New tool from Cloudmark is designed to defend against spear phishing

Discussion in 'Network World' started by RSS, Jan 22, 2016.

  1. RSS

    RSS New Member Member

    This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

    The nature of how cyber attacks start is changing. Today's malicious actors are not merely opportunistic, they know what information they want and who to target to get at it. For example, the 2014 breach at JP Morgan reportedly began when an IT employee opened a specially-crafted email and was tricked into providing credentials to a vulnerable internal machine. Attackers used the privileges of that person's credentials to move around the network until they were able to find and exfiltrate 83 million records in one of the largest data breaches of the year.

    To read this article in full or to leave a comment, please click here

    Continue reading...
     

Share This Page