CyberSecurity
REALITY CHECKING
Incidents of the cyber threat attack form known as ‘CEO fraud’ do not fi ll as many media headlines as big brand data breaches, but the challenge they pose is signifi cant, and senior executives should certainly understand it – especially as they personally are in the fi ring line. CEO fraud resembles phishing, but
is more sophisticated in that attackers go to greater lengths to obtain information on the
‘sender’. They
assemble genuine supportive details – logos, signatures, internal codes – that lend credibility to their bogus emails. They ‘cc’ fund transfer orders to actual colleagues using false email addresses. They’ll ask payments to be made to what appear to be known suppliers or contractors – but what are really disguised bank accounts. Some 270bn emails are sent each
day. This mass of messages provides malicious online actors with limitless scope for digital deception. Cyber criminals target any c-suite offi cer with power to authorise fi nancial payments. Many organisations don’t realise the full extent of their ‘risk surface’, and should be much more concerned about the information about them that’s available on the internet. Often victims of CEO fraud are not aware that
data valuable to fraudsters
is already ‘out there’. Companies without policies in place to govern how their staff should engage with social media surprise me. Employees at all levels – including executives – are liable to reveal information about themselves and their employer
Contact us :
that’s valuable to cyber-fraudsters. But a richer source of ‘intelligence’ for them is social media. That’s why it is critical to know what details of your organisation are accessible from social media sites. Few organisations have the IT resources to search the Web in real-time for this purpose. Cybersprint’s
monitoring solutions
protect your organisation by tracking emails that use your brand name or include the name of your senior
Cybersprint solutions can reduce your organisation’s ‘digital surface’, says CEO Pieter Jansen.
personnel or VIPs. They also provide a constantly-updated overview of legitimate domains and sub-domains, email activities, and social media checks. Cybersprint also provides informed guidance based on years of frontline experience safeguarding its
clients’ brand integrity and
Contact.cybersecurity@
airbus.com
www.airbus-cyber-security.com
reputations. Working in concert, our solutions vastly minimise the risk of a CEO fraud-style attack proving to be successful. Stand | Hall 10.0-423
Airbus CyberSecurity provides a wide range of training and consulting services to maximise your
risk
security posture. Our services can be tailored to the specific needs of your organisation and help you achieve compliance with national and international standards. The content of courses can be crafted for a range of audiences - from technical experts to operational managers, and include operational exercises on our self-developed cyber range. Our consultancy services can range from vulnerability audits to full architecture design and implementation, whatever is needed to help you build a resilient network and organisation. For your leap into the digital future.
We prevent, detect and resolve cases of brand abuse, data leaks, CEO fraud, phishing or hacking. We make invisible vulnerabilities visible. Interested? Try our free Quickscan and discover where your organisation is at risk.
CONTACT DETAILS For more information please go to: |
cybersprint.com |
info@cybersprint.com
HALLE 10.1 STAND 428
MEET US AT IT-SA 2019!
FURTHER INFO CYBERSPRINT BV
Securing Critical Business
In order to protect your reputation you need to minimise cyber risks and stay in control over your organisation’s online presence. Cybersprint’s Digital Risk Monitoring platform provides continuous real-time insights into the entire online attack surface of your organisation.
ADVERTORIAL CONTENT
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74