//////////////////////////////////////////////////////////////////////////
Have the attacks become
more sophisticated?
Absolutely. The thing that is happening now
is reconnaissance. Cybercriminals always
used to do that reconnaissance to find out
what your attack surface was, by scanning a
network to look for vulnerabilities.
But now what they’re doing is they’ll break
into a Gmail account or they’ll break into
an Internet-based email account of some
sort. Then they’ll sit on it for a while, and
www.intelligentcio.com
FEATURE: EMAIL SECURITY
they’ll watch the style and they’ll watch
the footers, and they’ll look at the PDF
documents that are created for invoices, and
they’ll gather all of this information before
they do anything about it. So actually, when
they do send the email they’re intimately
aware of the way the CISO talks or the way
the CFO talks on his emails or what he’ll
accept as an email or invoices.
So we tend to find the first attack is
harvesting credentials, so cybercriminals
will get somebody to fill in their credentials,
Jeff Ogden, Vice President Middle East
and India at Mimecast
INTELLIGENTCIO
41