Intelligent CIO Middle East Issue 50 | Page 41

////////////////////////////////////////////////////////////////////////// Have the attacks become more sophisticated? Absolutely. The thing that is happening now is reconnaissance. Cybercriminals always used to do that reconnaissance to find out what your attack surface was, by scanning a network to look for vulnerabilities. But now what they’re doing is they’ll break into a Gmail account or they’ll break into an Internet-based email account of some sort. Then they’ll sit on it for a while, and www.intelligentcio.com FEATURE: EMAIL SECURITY they’ll watch the style and they’ll watch the footers, and they’ll look at the PDF documents that are created for invoices, and they’ll gather all of this information before they do anything about it. So actually, when they do send the email they’re intimately aware of the way the CISO talks or the way the CFO talks on his emails or what he’ll accept as an email or invoices. So we tend to find the first attack is harvesting credentials, so cybercriminals will get somebody to fill in their credentials, Jeff Ogden, Vice President Middle East and India at Mimecast INTELLIGENTCIO 41