Phishing attacks and other email compromise schemes are not just an annoyance in the modern workspace. A successful email compromise can allow malicious actors to intrude into an organization’s enterprise email accounts, expose sensitive data contained in users’ inboxes, and give cyber criminals the ability to successfully impersonate an employee to others within and without the organization by using the employee’s own email account.
Read more »Tag: microsoft office 365
-
Improving Your Office365 Security Posture to Stop Phishing at Email’s Shores Posted on: April 03, 2019 In: Data Privacy & Cybersecurity
-
Social Engineering Targets: Email Compromises - A Quick Prevention Guide Posted on: October 15, 2018 In: Data Privacy & Cybersecurity
More than ever before, malicious actors are targeting email platforms in an attempt to access and monetize sensitive personal information. They often gain access to email accounts through the use of social engineering – inducing unsuspecting account owners to open email attachments that contain malicious computer code (malware).
Read more »
Blog Search
Featured Posts
- May 10, 2022 NCAA Takes Action to Address “Collectives” and “Booster” Involvement in NIL Activity
- May 09, 2022 Can Your Coffee Maker Be Hacked? Cybersecurity Issues and the Growing Internet of Things
- April 15, 2022 Federal Law Ends Mandatory Arbitration of Sexual Harassment and Sexual Assault Claims
Blog Tags
alabama
arkansas
audit
bank secrecy act
biometric data
blockchain
breach notification
california
canada
ccpa
cisa
client notification
colorado
congress
connecticut
consumer data
consumer notification
consumer rights
coronavirus
covid-19
cppa
cpra
cryptocurrency
cyberattack
cyber insurance
cybersecurity
cyber threat
cyberwarfare
data breach
data privacy
data protection
data security
delaware
email
employment
equifax
eu
eu-u.s. privacy shield
european union
executive order
fbi
fcra
federal trade commission
financial fraud kill chain
fincen
fraud
ftc
gdpr
hacking
healthcare
hhsocr
hipaa
holiday season
human resources
identity theft
illinois
incident response
information security
irs
legislation
legislative alert
malware
maryland
massachusetts
microsoft
microsoft exchange servers
multi-factor authentication
multi-factor identification
new jersey
new mexico
new york
ninth circuit
nist
nist security controls
ofac
office for civil rights
opt out
personal data
personal information
phishing
privacy law
privacy protection patchwork
protected health information
ransomware
regulations
sec
social engineering
social media
statute
supreme court
tax returns
utah
vcdpa
virginia
w2
washington
websites
wire transfers
workplace policy
zoom