Protecting Against Account Takeover Based Email Attacks

Analyze, detect, and block ATO-based email attack

Published February 2019

aa

Cybercriminals know that employees are the weak link in an organization and need only to convince these targets that they are someone who should be trusted to achieve success. In terms of methods used to deceive employees, email spoofing and display name deception have been the “go-to” techniques.

This report discusses a typical ATO- based email attack flow, why they are effective, and why organizations should be placing a high priority on stopping these attacks in 2019 and beyond.

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2019