SlideShare a Scribd company logo
1 of 31
Download to read offline
Protecting Your Users Against
Email Spoofing and Phishing
Brian Reid - NBConsult
1
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Brian Reid | NBConsult
• Microsoft Office Servers and
Services MVP
• Exchange Server Microsoft
Certified Master
• brian@nbconsult.co
“There are two kinds of big
companies, those who’ve been
hacked, and those who don’t know
they’ve been hacked.”
James Comey, “Ex” Director FBI
Wall Street Journal, JP Mo
White House, Yahoo, RSA
Microsoft, Google, Apple,
Facebook, Sony, Target,
Heartland ,EBay TalkTalk,
ICANN, Home Depot, Vtec
Carphone Warehouse, UP
Dropbox, LinkedIn, Repub
struggling
THE EVOLUTION OF ATTACKS
Volume and Impact
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
2003-2004
THE EVOLUTION OF ATTACKS
2005-PRESENT
Organized
Crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Profit
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
2003-2004
THE EVOLUTION OF ATTACKS
2005-PRESENT
Organized
Crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: Profit
Script Kiddies
BLASTER, SLAMMER
Motive: Mischief
2012 - Beyond
Nation States,
Activists,
Terror Groups
BRAZEN,
COMPLEX,
PERSISTENT
Motives:
IP Theft,
Damage,
Disruption
2003-2004
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Business Compromise Email Attacks
• What a business compromise email attack is and what it can do
• Some numbers
• How the attacks work
• A real (and costly) example
• How to protect yourself and your company
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
What Is A Business Compromise Email Attack
• Cyber criminal impersonates executive (often CEO) and
attempts to get employee, customer or vendor to transfer funds
or sensitive information to the phisher
• So notice, it’s not always within one company
• And it is not always (initially) financially motivated
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
FBI Data on Business Compromise Email
Worldwide
• And not related to
company size
• SME and
Enterprises just as
likely to get same
phish attempts
• Enterprises tend to
have better
payment protection
in place
It is largely unknown
how victims are
selected
• The subjects
monitor and study
their selected
victims using social
engineering
techniques prior to
initiating the BEC
scam.
Victims may also first
receive “phishing” e-
mails
• Requesting
additional details
regarding the
business or
individual being
targeted (name,
travel dates, etc.).
Bank accounts used
in attack cannot be
predicted
• May have been set
up as part of
another “money
mule” fraud
• Accounts set up
and money
transferred through
them
• Innocent party
account being used
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Business
Compromise Email
or Whaling Attacks
• Business email compromise attacks
cost global industries over $5.3B last
year (and $3B the year before)
• “SMEs have not historically been the
target of cybercrime but in 2015
something drastically changed,”
• Toni Allen, UK head of client
propositions at the British Standards
Institute (BSI).
• According to the latest statistics
released by cyber security firm
Symantec, 1 in 2000/3000 emails in
2016 was a phishing attack and the
organization size does not impact
this
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Email Phishing
Rate
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Companies of all
sizes are prone to
BEC attacks
• Proofpoint data indicates no correlation
between the size of the company and BEC
attack volume.
• Larger companies make for attractive
targets because they have more funds to
draw on and greater organizational
complexity to hide behind, even if they tend
to have stricter financial controls.
• And while smaller companies may not yield
the same returns, the relative absence of
financial controls makes them more
vulnerable.
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Scary Facts
• 40,203 BEC attacks (known) in the last three years and a 2370%
increase in identified losses taking place form Jan 2015 to Dec 2016
• BEC attacks increased by 45 percent in the last three months of
2016 vs. the prior three months.
• 2/3 of all BEC attacks spoofed their email address domain so that
their fraudulent emails displayed the same domain as that of the
company targeted in the attack
• While CEO impersonation continues in BEC attacks, cybercriminals
are increasingly targeting victims deeper within organizations.
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
BEC In The News
• Southern Oregon University
• $1.9M paid to the “construction company” working at the University
announced this month
• The 'bogus boss' email scam costing firms millions
• Etna Industrie, France - €100,000
• http://www.bbc.com/news/business-35250678 - Jan 2016
• Manufacturing, retail and technology organizations are
generally more targeted with BEC attacks
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
How Do Business Compromise Email Schemes Work?
• Version 1: Bogus Invoice Scheme
• Version 2: CEO Fraud
• Version 3: Account Compromise
• Version 4: Lawyer Impersonation
• Version 5: Data Theft
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
BEC Video
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Bogus Invoice Scheme
Cybercriminal
compromises
employee email
Compromises
account is used to
send notifications
to customers
Payments are
transferred to
cybercriminal’s
account
Cybercriminal
receives money
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
CEO Fraud
Cybercriminal poses
as company exec
and emails finance
person
Finance sends funds
to cybercriminal’s
account
Cybercriminal
receives
money
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Account Compromise
Compromised
employee account
is used to request
payment
Cybercriminal
receives
money
Recipients transfer
payments to
cybercriminal’s
account
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Lawyer Impersonation
Cybercriminal poses
as lawyer and
emails finance
person
Finance sends to
cybercriminal’s
account
Cybercriminal
receives
money
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Data Theft
Cybercriminal
compromises
employee email
Compromises
account is used to
send notifications
to customers
PII is sent to
cybercriminal’s
account
Cybercriminal
receives PII, uses it
for further
compromise attacks
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Where Does It Happen
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Real (Redacted) Example Of Some BEC
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
How To Protect Your Company
Avoid
Avoid free “web
based” accounts
for your company
• Establish a domain
name and use it to
establish
communications
Take Care
Take care in posting
to social media
sites
• Especially job
duties/descriptions,
hierarchal
information, and out
of office details
Be Suspicious
Be suspicious of
requests for
secrecy or pressure
to take action
quickly
Consider
Consider additional
IT and financial
security
procedures,
including the
implementation of
a 2-step verification
process
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
How To Protect Your Company
Significant
Significant Changes:
Beware of sudden
changes in business
practices
Register
Register all company
domains that are
slightly different than
the actual company
domains
Verify
Verify changes in
vendor payment
location or details
For example adding
additional two-factor
authentication such
as having a secondary
sign-off by company
personnel
Know
Know the habits of
your customers,
including the details
of, reasons behind,
and amount of
payments
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Reporting Loss
Act Immediately
Notify your financial organization
when you discover the fraud
Police
Contact law enforcement in your
territory regardless of how small the
fraud is
www.ic3.com (US)
actionfraud.police.uk
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
End User Education
• Raise executive and then all employee awareness
• It is often human error that leads to the compromise in the first
place
• Beware of high level executive emails that are unexpected
• Get a secondary verification of the request
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Ensure Proper Controls Are In Place
• Verify fund transfers
• Verify changes in invoice payment details with a secondary
verification
• Use common sense
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Protect
• Intentionally phish your users (i.e. phishme.com) and see what
happens
• Implement DMARC (with SPF) and use a DMARC aggregator
service
• Keep your email protection service with a company that is
innovating
Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017
Follow us:
#O365ENGAGE17
Questions? | Thank You!
Brian Reid
brian@nbconsult.co
We’d like to know what you think!
Please fill out the evaluation form you
received at the registration desk for this
session
Session recordings and materials:
Materials will be available on
Office365Engage.com soon

More Related Content

What's hot

Dave Cacioppo KCDMA Presentation
Dave Cacioppo KCDMA PresentationDave Cacioppo KCDMA Presentation
Dave Cacioppo KCDMA Presentationkloggia
 
How will GDPR affect Direct Mail Marketing?
How will GDPR affect Direct Mail Marketing?How will GDPR affect Direct Mail Marketing?
How will GDPR affect Direct Mail Marketing?Birch Print
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006Alan Mather
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoSmarsh
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?Hilary G. Killian
 
Building Smarter Organizations SIKM February 2018
Building Smarter Organizations SIKM February 2018Building Smarter Organizations SIKM February 2018
Building Smarter Organizations SIKM February 2018Gordon Vala-Webb
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decadestudentinternetdeals33
 
Data Protection Magazine
Data Protection Magazine Data Protection Magazine
Data Protection Magazine teresadepiano
 
Building smarter organizations km world 2017
Building smarter organizations km world 2017Building smarter organizations km world 2017
Building smarter organizations km world 2017Gordon Vala-Webb
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...Jessica Pattison
 
Helping You Navigate & Understand Unemployment Claims
Helping You Navigate & Understand Unemployment ClaimsHelping You Navigate & Understand Unemployment Claims
Helping You Navigate & Understand Unemployment ClaimsDominique Bunker, CNP
 

What's hot (18)

Dave Cacioppo KCDMA Presentation
Dave Cacioppo KCDMA PresentationDave Cacioppo KCDMA Presentation
Dave Cacioppo KCDMA Presentation
 
How will GDPR affect Direct Mail Marketing?
How will GDPR affect Direct Mail Marketing?How will GDPR affect Direct Mail Marketing?
How will GDPR affect Direct Mail Marketing?
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_videoNavigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
Navigating the expanding compliance perimeter smarsh 2016_notes_20 04 16_video
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Ashely Madison Hack
Ashely Madison HackAshely Madison Hack
Ashely Madison Hack
 
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
WHAT’S YOUR ORGANIZATION’S EXPOSURE ON THE DARK WEB?
 
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your BusinessWebinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
Webinar: Introduction to GDPR - What It Is and How It Will Affect Your Business
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Schrems II and India
Schrems II and IndiaSchrems II and India
Schrems II and India
 
Building Smarter Organizations SIKM February 2018
Building Smarter Organizations SIKM February 2018Building Smarter Organizations SIKM February 2018
Building Smarter Organizations SIKM February 2018
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Data Protection Magazine
Data Protection Magazine Data Protection Magazine
Data Protection Magazine
 
Building smarter organizations km world 2017
Building smarter organizations km world 2017Building smarter organizations km world 2017
Building smarter organizations km world 2017
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
 
Helping You Navigate & Understand Unemployment Claims
Helping You Navigate & Understand Unemployment ClaimsHelping You Navigate & Understand Unemployment Claims
Helping You Navigate & Understand Unemployment Claims
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
June NOW 2014
June NOW 2014June NOW 2014
June NOW 2014
 

Similar to O365Engage17 - Protecting your Users Against Email Spoofing and Phishing

Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...MHM (Mayer Hoffman McCann P.C.)
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmGabor Szathmari
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017Steve Greene
 
Cap Tech Talks Webinar April=l 2020 business email cybersecurity
Cap Tech Talks Webinar April=l 2020 business email cybersecurity Cap Tech Talks Webinar April=l 2020 business email cybersecurity
Cap Tech Talks Webinar April=l 2020 business email cybersecurity Bill Gibbs
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptxalexadejumo
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Executive Leaders Network
 
Bradley Family E.docx
Bradley Family E.docxBradley Family E.docx
Bradley Family E.docxjasoninnes20
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primerfwscholl
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
Cyber security training presentation
Cyber security training presentationCyber security training presentation
Cyber security training presentationBrandon Vancleeve
 

Similar to O365Engage17 - Protecting your Users Against Email Spoofing and Phishing (20)

Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...
Webinar Slides: Not-for-Profits Are Not Exempt from Risk: What You Need to Kn...
 
Iron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firmIron Bastion: Preventing business email compromise fraud at your firm
Iron Bastion: Preventing business email compromise fraud at your firm
 
BBB October 2018 Market Monitor
BBB October 2018 Market Monitor BBB October 2018 Market Monitor
BBB October 2018 Market Monitor
 
BBB Market Monitor: June 2023
BBB Market Monitor: June 2023BBB Market Monitor: June 2023
BBB Market Monitor: June 2023
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
BBB Market Monitor: April 2017
BBB Market Monitor: April 2017BBB Market Monitor: April 2017
BBB Market Monitor: April 2017
 
BBB April 2017 Market Monitor
BBB April 2017 Market Monitor  BBB April 2017 Market Monitor
BBB April 2017 Market Monitor
 
MGI Fraud Report 2017
MGI Fraud Report 2017MGI Fraud Report 2017
MGI Fraud Report 2017
 
Cap Tech Talks Webinar April=l 2020 business email cybersecurity
Cap Tech Talks Webinar April=l 2020 business email cybersecurity Cap Tech Talks Webinar April=l 2020 business email cybersecurity
Cap Tech Talks Webinar April=l 2020 business email cybersecurity
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
social_engineering.pptx
social_engineering.pptxsocial_engineering.pptx
social_engineering.pptx
 
August2016 bbb market monitor
August2016 bbb market monitorAugust2016 bbb market monitor
August2016 bbb market monitor
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
Current Ransomware Trends, Ransomware Attack Survey 2022 (Colin Wright at Hor...
 
Bradley Family E.docx
Bradley Family E.docxBradley Family E.docx
Bradley Family E.docx
 
Cybercrime: A Primer
Cybercrime:  A PrimerCybercrime:  A Primer
Cybercrime: A Primer
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Cyber security training presentation
Cyber security training presentationCyber security training presentation
Cyber security training presentation
 

More from NCCOMMS

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...NCCOMMS
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerNCCOMMS
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldNCCOMMS
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoNCCOMMS
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoNCCOMMS
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntNCCOMMS
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...NCCOMMS
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...NCCOMMS
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...NCCOMMS
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineNCCOMMS
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineNCCOMMS
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsNCCOMMS
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsNCCOMMS
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...NCCOMMS
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfNCCOMMS
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...NCCOMMS
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerNCCOMMS
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltNCCOMMS
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseNCCOMMS
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenNCCOMMS
 

More from NCCOMMS (20)

O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
O365Con19 - UI:UX 101 Learn How to Design Custom Experiences for SharePoint -...
 
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick BakkerO365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
O365Con19 - Model-driven Apps or Canvas Apps? - Rick Bakker
 
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper OosterveldO365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
O365Con19 - Office 365 Groups Surviving the Real World - Jasper Oosterveld
 
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis JugoO365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
O365Con19 - Developing Timerjob and Eventhandler Equivalents - Adis Jugo
 
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis JugoO365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
O365Con19 - Sharepoint with (Artificial) Intelligence - Adis Jugo
 
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul HuntO365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
O365Con19 - What Do You Mean 90 days Isn't Enough - Paul Hunt
 
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
O365Con19 - Tips and Tricks for Complex Migrations to SharePoint Online - And...
 
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
O365Con19 - Start Developing Teams Tabs and SharePoint Webparts with SPFX - O...
 
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
O365Con19 - Start Your Journey from Skype for Business to Teams - Sasja Beere...
 
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi RoineO365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
O365Con19 - Lets Get Started with Azure Container Instances - Jussi Roine
 
O365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi RoineO365Con19 - Azure Blackbelt - Jussi Roine
O365Con19 - Azure Blackbelt - Jussi Roine
 
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna LinsO365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
O365Con19 - Customise the UI in Modern SharePoint Workspaces - Corinna Lins
 
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna LinsO365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
O365Con19 - Be The Protagonist of Your Modern Workplace - Corinna Lins
 
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
O365Con19 - How to Really Manage all your Tasks Across Microsoft 365 - Luise ...
 
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio StruyfO365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
O365Con19 - Sharing Code Efficiently in your Organisation - Elio Struyf
 
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
O365Con19 - Things I've Learned While Building a Product on SharePoint Modern...
 
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de JagerO365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
O365Con19 - Keep Control of Your Data with AIP and CA - Bram de Jager
 
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van RousseltO365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
O365Con19 - Kaizala a Dive Into the Unknown - Rick van Rousselt
 
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise FreeseO365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
O365Con19 - How to Inspire Users to Unstick from Email - Luise Freese
 
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris GoosenO365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
O365Con19 - O365 Identity Management and The Golden Config - Chris Goosen
 

Recently uploaded

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 

Recently uploaded (20)

JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

O365Engage17 - Protecting your Users Against Email Spoofing and Phishing

  • 1. Protecting Your Users Against Email Spoofing and Phishing Brian Reid - NBConsult 1
  • 2. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Brian Reid | NBConsult • Microsoft Office Servers and Services MVP • Exchange Server Microsoft Certified Master • brian@nbconsult.co
  • 3. “There are two kinds of big companies, those who’ve been hacked, and those who don’t know they’ve been hacked.” James Comey, “Ex” Director FBI
  • 4. Wall Street Journal, JP Mo White House, Yahoo, RSA Microsoft, Google, Apple, Facebook, Sony, Target, Heartland ,EBay TalkTalk, ICANN, Home Depot, Vtec Carphone Warehouse, UP Dropbox, LinkedIn, Repub struggling
  • 5. THE EVOLUTION OF ATTACKS Volume and Impact Script Kiddies BLASTER, SLAMMER Motive: Mischief 2003-2004
  • 6. THE EVOLUTION OF ATTACKS 2005-PRESENT Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief 2003-2004
  • 7. THE EVOLUTION OF ATTACKS 2005-PRESENT Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief 2012 - Beyond Nation States, Activists, Terror Groups BRAZEN, COMPLEX, PERSISTENT Motives: IP Theft, Damage, Disruption 2003-2004
  • 8. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Business Compromise Email Attacks • What a business compromise email attack is and what it can do • Some numbers • How the attacks work • A real (and costly) example • How to protect yourself and your company
  • 9. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 What Is A Business Compromise Email Attack • Cyber criminal impersonates executive (often CEO) and attempts to get employee, customer or vendor to transfer funds or sensitive information to the phisher • So notice, it’s not always within one company • And it is not always (initially) financially motivated
  • 10. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 FBI Data on Business Compromise Email Worldwide • And not related to company size • SME and Enterprises just as likely to get same phish attempts • Enterprises tend to have better payment protection in place It is largely unknown how victims are selected • The subjects monitor and study their selected victims using social engineering techniques prior to initiating the BEC scam. Victims may also first receive “phishing” e- mails • Requesting additional details regarding the business or individual being targeted (name, travel dates, etc.). Bank accounts used in attack cannot be predicted • May have been set up as part of another “money mule” fraud • Accounts set up and money transferred through them • Innocent party account being used
  • 11. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Business Compromise Email or Whaling Attacks • Business email compromise attacks cost global industries over $5.3B last year (and $3B the year before) • “SMEs have not historically been the target of cybercrime but in 2015 something drastically changed,” • Toni Allen, UK head of client propositions at the British Standards Institute (BSI). • According to the latest statistics released by cyber security firm Symantec, 1 in 2000/3000 emails in 2016 was a phishing attack and the organization size does not impact this
  • 12. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Email Phishing Rate
  • 13. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Companies of all sizes are prone to BEC attacks • Proofpoint data indicates no correlation between the size of the company and BEC attack volume. • Larger companies make for attractive targets because they have more funds to draw on and greater organizational complexity to hide behind, even if they tend to have stricter financial controls. • And while smaller companies may not yield the same returns, the relative absence of financial controls makes them more vulnerable.
  • 14. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Scary Facts • 40,203 BEC attacks (known) in the last three years and a 2370% increase in identified losses taking place form Jan 2015 to Dec 2016 • BEC attacks increased by 45 percent in the last three months of 2016 vs. the prior three months. • 2/3 of all BEC attacks spoofed their email address domain so that their fraudulent emails displayed the same domain as that of the company targeted in the attack • While CEO impersonation continues in BEC attacks, cybercriminals are increasingly targeting victims deeper within organizations.
  • 15. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 BEC In The News • Southern Oregon University • $1.9M paid to the “construction company” working at the University announced this month • The 'bogus boss' email scam costing firms millions • Etna Industrie, France - €100,000 • http://www.bbc.com/news/business-35250678 - Jan 2016 • Manufacturing, retail and technology organizations are generally more targeted with BEC attacks
  • 16. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 How Do Business Compromise Email Schemes Work? • Version 1: Bogus Invoice Scheme • Version 2: CEO Fraud • Version 3: Account Compromise • Version 4: Lawyer Impersonation • Version 5: Data Theft
  • 17. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 BEC Video
  • 18. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Bogus Invoice Scheme Cybercriminal compromises employee email Compromises account is used to send notifications to customers Payments are transferred to cybercriminal’s account Cybercriminal receives money
  • 19. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 CEO Fraud Cybercriminal poses as company exec and emails finance person Finance sends funds to cybercriminal’s account Cybercriminal receives money
  • 20. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Account Compromise Compromised employee account is used to request payment Cybercriminal receives money Recipients transfer payments to cybercriminal’s account
  • 21. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Lawyer Impersonation Cybercriminal poses as lawyer and emails finance person Finance sends to cybercriminal’s account Cybercriminal receives money
  • 22. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Data Theft Cybercriminal compromises employee email Compromises account is used to send notifications to customers PII is sent to cybercriminal’s account Cybercriminal receives PII, uses it for further compromise attacks
  • 23. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Where Does It Happen
  • 24. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Real (Redacted) Example Of Some BEC
  • 25. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 How To Protect Your Company Avoid Avoid free “web based” accounts for your company • Establish a domain name and use it to establish communications Take Care Take care in posting to social media sites • Especially job duties/descriptions, hierarchal information, and out of office details Be Suspicious Be suspicious of requests for secrecy or pressure to take action quickly Consider Consider additional IT and financial security procedures, including the implementation of a 2-step verification process
  • 26. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 How To Protect Your Company Significant Significant Changes: Beware of sudden changes in business practices Register Register all company domains that are slightly different than the actual company domains Verify Verify changes in vendor payment location or details For example adding additional two-factor authentication such as having a secondary sign-off by company personnel Know Know the habits of your customers, including the details of, reasons behind, and amount of payments
  • 27. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Reporting Loss Act Immediately Notify your financial organization when you discover the fraud Police Contact law enforcement in your territory regardless of how small the fraud is www.ic3.com (US) actionfraud.police.uk
  • 28. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 End User Education • Raise executive and then all employee awareness • It is often human error that leads to the compromise in the first place • Beware of high level executive emails that are unexpected • Get a secondary verification of the request
  • 29. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Ensure Proper Controls Are In Place • Verify fund transfers • Verify changes in invoice payment details with a secondary verification • Use common sense
  • 30. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Protect • Intentionally phish your users (i.e. phishme.com) and see what happens • Implement DMARC (with SPF) and use a DMARC aggregator service • Keep your email protection service with a company that is innovating
  • 31. Protecting Your Users Against Email Spoofing and Phishing | Brian Reid | 10:45 21st June 2017 Follow us: #O365ENGAGE17 Questions? | Thank You! Brian Reid brian@nbconsult.co We’d like to know what you think! Please fill out the evaluation form you received at the registration desk for this session Session recordings and materials: Materials will be available on Office365Engage.com soon