Upload
hacker-combat
View
206
Download
0
Embed Size (px)
Citation preview
One in Nine Email Users Encounter Malware…Are You the ‘One’?
H T T P S : / / H A C K E R C O M B A T . C O M /
BEEHAVE
One in nine email users had encountered email malware during the first half of 2017.
Security firm SymantecThe Symantec report statesThe inference is
Se
curi
ty f
irm
S
ym
ant
ec:
EEHAVE1. The report, which discusses mainly the threat landscape where hackers spread malicious threats.
2. BEC (Business Email Compromise) scams etc through email, also states that today users encounter threats.
3. Email twice as often as any other infection vector.
The
Sy
ma
nte
c re
por
t st
ate
s:1. Email is by far the most popular method for attackers to spread malicious code.
2. A user is almost twice as likely to encounter malicious code through email than being impacted by an exploit kit.
3. One out of every nine email users has encountered email malware in the first half of 2017.
The
infe
renc
e is
:1. This upturn translates into an increase of 11 more spam emails in your inbox each month than a year prior.
2. The research found that users working in the manufacturing, retail trade, construction and mining industries encountered 1.5 times more spam emails compared to others.
3. The cost that a business today incurs, by way of managing spam emails, too gets discussed in the report.
BEEHAVE
What is a Business Email Compromise (BEC) Attack?
BEC Attack is an work in which the attacker gains access to a corporate email account and spoofs the owner's identity to defraud the company or its employees, customers or partners of money.
BEEHAVE
What Can Do to Stop a BEC Attack?
Always double-check before sending money or data. Require multi-factor authentication. Run regular spoof checks. Teach employees how to spot phishing.
BEEHAVE
What is the types of Email threats to E- mail Security?
Viruses Worms Trojan Horses, Spyware
BEEHAVE
How to Prevent BEC Scams?
To product a BEC attack from causing heavy losses to the company is to use additional means of communication, and not just email, IT security professionals should also rely on advanced security solutions that block the malware used to commit BEC attacks.
Thank You!
F O R M O R E I N F O R M A T I O N V I S I T H A C K E R C O M B A T .
HTTPS://HACKERCOMBAT.COM/