Email is the number one exploited vector for cyber attacks. It is therefore important for your organisation to understand the types of email-borne threats that are out there. There are a wide variety of ways that threat actors could compromise your organisation through email. Knowing these threats and how they operate would empower your users to be more wary and think twice before clicking a link, opening an email attachment or replying a seemingly innocuous email.
0 Comment Log in or register to post comments