1 / 25

Karsten Chearis Sales Engineer

Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them. Karsten Chearis Sales Engineer. 1 minute 40 seconds median time-to-open malicious email. Verizon 2 016 Data Breach Investigations Report (DBIR). 91% of all incidents start with a phish.

sergioe
Télécharger la présentation

Karsten Chearis Sales Engineer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Explaining Bitcoins will be the easy part: Email Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer

  2. 1 minute 40 seconds median time-to-open malicious email Verizon 2016 Data Breach Investigations Report (DBIR)

  3. 91% of all incidents start with a phish Wired 2015

  4. Think Your Employees are Alert Enough to Stop Them? Confidential |

  5. You are susceptible to email-borne attacks if…. You use email as a key business application You have certain letters in your domain name You accept resumes on your website You have a team of people in finance You have a profile Your life is deemed interesting enough to be on You run Windows…or any other OS

  6. How Do The Attackers Do It?

  7. Do You Have a Page Like This On Your Website?

  8. You don’t even need to know how to code…Crimeware as a Service - CaaS

  9. Cybercriminals Operate Like Any Other Business

  10. Occasionally the Attacks Hit the General Media WannaCry? But usually they don’t

  11. Real life examples with Email

  12. Vector: Phishing attack with malicious URL Threat: Entering credentials Target: Random mass-mailing

  13. Vector: Phishing email with attachment Threat: Opening the document and activating malicious code Target: Targeted mailing

  14. Business Email CompromiseWhalingWire transferW-2 Fraud Who Says Attacks Need to Involve Malware?

  15. Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

  16. Vector: Spear phishing attack Threat: Impersonating senior staff Target: An employee with authority

  17. Vector: Email attack from the inside using a hacked email account Threat: Impersonating employees Target: Spreading the attack internally

  18. Are Users Part of the Solution or Part of the Problem? • The Compromised Insider • The Careless Insider • The Malicious Insider

  19. Herd alertness helps, but… Confidential |

  20. Can we do more with technology? - YES! Confidential |

  21. Cyber Resiliency Secure Gateway - Continuity - Independent Archive - Backup & Recovery - Anti-virus / malware - Anti-spam - Reputation analysis Comprehensive protection, simply achieved in the cloud Mimecast Email Security Suite Targeted Threat Protection URL Attachment Impersonation Internal Emails

  22. ContinueYou need to continue to work while the issue is resolved ProtectYou need the technology that provides the best possible multi-layered protection RemediateYou need to get back to the last known good state Cyber Resilience Confidential |

More Related