Email Spoofing Danger
APC INTEGRATED is aggressively addressing this concern for others while working proactively to protect you from such instances
Scenario 1
- Threat actor spoofs your vendor’s email, sending an invoice to you
- Recognizing the vendor, payment is sent
- Threat actor repeats activity while vendor(s) fail to get paid, you lose thousands
Scenario 2
- Threat actor spoofs your email address
- Sends package to multiple contacts in your niche industry
- Contacts open the compromising email and threat actor gains access to numerous organizations.
- Your organization sees email disruption due to blacklisted domain
What to do about it
Multi-factor authentication (MFA) sign-in
Stop BYOD –most common vector for civil and criminal offenses
Conditional access policies –restrict data access for your organization
Data-leakage prevention policies –alerts, restrictions, and reports on data usage
DKIM & DMARC email security –eliminate spoofing