November 2019 Newsletter Malware, Phishing, and Other Lurking Threats
November 2019
Security threats come from everywhere. Detecting those threats before they cause damage is paramount to an organization’s success. Even though some threat detections require technical skills, the ultimate threat detection is you--the human firewall. This month’s newsletter addresses the who, what, and why of enterprise threat detection and highlights two major threats: BEC and ransomware
- ____________________ monitors internal processes, registry settings, file activity, and network activity. (Endpoint detection and response or EDR)
- When an attacker impersonates a supplier, they are carrying out what type of BEC? (Invoice scams)
- Fraudsters who use ransomware are looking for which of the following? (c)
- An organization’s financial information
- Personal information on CEOs
- Large amounts of money
- Employees’ email accounts
- If you receive an email from your boss requesting a money transfer, what should you do? (d)
- Fulfill the request immediately
- Reply to the email to confirm
- Vocally confirm the request
- Report the email
- Malware without _______________ is very rare. (human interaction)