Subscribe to Cyber Resilience Insights
Get the latest cybersecurity news, analysis and tips delivered to your inbox every week.
Impersonation attacks are on the rise.
Impersonation attacks are among the latest advanced targeted attacks that use email to dupe employees into revealing information or making financial transactions. During impersonation attacks, attackers pose as a CEO, CFO or other high level executive and request an employee to perform a specific action via email. Impersonation attacks like wire transfer phishing often trick users into making wire transfers or revealing sensitive employee data such as payroll information that may be used in identity theft.
Impersonation attacks succeed by utilizing engineering tactics against users, including display names and domain names that appear to be genuine but are actually well-crafted fakes. Attackers often use personal information found on social media accounts to convince the user that the email has been sent by a trusted individual.
1In recent years, the number of impersonation attacks has risen sharply, with the FBI estimating a 270% increase in the first eight months of 2015, and the cost of these attacks to the business world has exceeded $2 billion since January 2015.
To thwart impersonation attacks, a growing number of organizations worldwide are turning to the highly effective phishing protection software provided by Mimecast's email security services.
Mimecast provides comprehensive defenses against advanced targeted attacks, providing highly effective impersonation, phishing and spear phishing protection. Mimecast Targeted Threat Protection scans email in real-time to identify and block suspicious websites and attachments, and to prevent employees from inadvertently revealing credentials or succumbing to financial fraud. Mimecast's email security services can also stop ransomware, provide 100% anti-malware protection, combat spam and defend against data leaks and other email threats.
Mimecast's email protection software provides comprehensive defenses against email threats. These include: