6 ways to harpoon whaling attackers

Anatomy of an Attack: Protecting Your Organization from CEO Email Scams

Cover

Out of all the aquatic vertebrate-themed cyberattacks, whaling is particularly threatening. In fact, whaling schemes – also known as impersonation or business email compromise attacks – led to more than $2.3 billion in losses over the last 3 years.

Understanding the five phases of a whaling assault can help you better prepare for an occurrence. Learn about the quintessential stages of an impending attack, plus:

  • Why whaling works
  • Six ways stop these thieves
  • Companies that have fallen victim
  • And more 
Vendor:
Mimecast
Posted:
08 Jun 2016
Published:
08 Jun 2016
Format:
PDF
Length:
13 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.