Intelligent CIO Middle East Issue 36 | Page 20

LATEST INTELLIGENCE STOPPING EMAIL FRAUD PRESENTED BY Download whitepaper here How Proofpoint helps protect your organisation from impostors, phishers and other non-malware threats growing. In just one example, a Lithuanian man has been accused of stealing more than US$100 million in separate attacks on Google and Facebook in July 2017. Today’s email attacks have evolved. Unfortunately, most security tools haven’t evolved with them. Attackers are moving and adapting faster than most cyberdefences. They’re bypassing security tools with new techniques and delivery methods. And some are avoiding legacy controls altogether through novel attacks that don’t use malware at all. The man allegedly spoofed a vendor in the companies’ supply chains. These attacks are sophisticated and highly targeted. Email fraud, sometimes called business email compromise (BEC), is one of them. Cybercriminals can easily spoof executives and business partners to trick people into sending money and other valuable information. This growing threat has cost victims more than US$5.3 billion since the FBI began tracking it in late 2013.1 The average attack nets about US$130,000. Partner spoofing attacks, where a fraudster pretends to be an organisation’s trusted vendor, are also 20 INTELLIGENTCIO They exploit people, not technology. And stopping them requires a new people-centred approach. Proofpoint Advanced Email Security uses a multilayered defence to stop unsafe email from reaching people’s inboxes – and keep sensitive information in your environment when something goes wrong. Deploying a multilayered defence: an analogy Consider how airports manage a vast and changing mix of potential security issues. Most take a two- pronged approach, each of those prongs featuring multiple checks and procedures. www.intelligentcio.com