Anatomy of a Phish
Exploring the New Security Threats from Social Attacks, and What to Do About Them
This book can be downloaded and read in iBooks on your Mac or iOS device.
Experts have noticed a sharp rise in phishing and other social attack vectors and expect this upward trend to continue. When phishing is used in combination with advanced persistent threats or APTS, hackers have the upper hand against companies relying on traditional data security techniques. In Anatomy of a Phish, Andy Green, a Digital Content Producer and security blogger at Varonis Systems, tells the story of a phishing incident that's based on actual breaches. Green explains how hackers can get through perimeter-based defenses, access customer personal information (credit card and social security numbers), and exfiltrate the data without IT being aware of the breach. However, companies can limit liabilities through better control of their human-generated data and real-time file monitoring technology.
Well written and educational.
Customers Also Bought
- Category: Computers
- Published: Feb 19, 2014
- Publisher: Varonis Systems, Inc.
- Seller: Varonis Systems, Inc.
- Print Length: 21 Pages
- Language: English