We all accept risks when we communicate by email, and it can be nearly impossible to keep that line of communication open without letting a few illegitimate emails slip through our blind spots. In this post, we’ll talk about how phishing attacks play out for businesses and share some ideas on how to defend yourself from this highly successful method of attack.
As you work to understand the impact of a risk, you should look to the C.I.A. Triad of Information Security and its foundational principles for guidance. This takes into consideration how an attack may impact information systems your business relies on or the data that you protect and manage.
This is a follow up technical discussion and breakdown of the events that lead to the New York Department of Financial Services (NYDFS) issuing their first violations against NYCRR500 to