클라이언트: Proofpoint Ltd
양식: 솔루션 브리프
크기: 337KB
언어: 영어
날짜: 14.05.2024

How Proofpoint Defends Against Cloud Account Takeover

Cyber criminals are following businesses into the cloud. As more companies adopt hosted email and webmail, cloud productivity apps like Microsoft 365 and Google Workspace, and cloud development environments like AWS and Azure, cyber criminals have quickly learned that the basic corporate account credential is a potential source of money and power. They now target these credentials in growing numbers of threat campaigns. And their relentless efforts are just the opening salvos in their mission to execute wire fraud, industrial espionage, PII data theft and more.

A cloud account takeover starts with attackers compromising user credentials and gaining entry into user systems. These attacks often originate from email in messages that carry malware or trick users into providing their credentials. Once they take over an account, they can pose as legitimate or trusted persons within the user’s organisation. The infiltrators can move laterally and wreak widespread damage. They can steal or encrypt important data. They can also upload malware to use the sync-and-share capabilities between your endpoints, Microsoft 365 and other cloud repositories. From there, they can quickly spread across your organisation or download sensitive files to use for extortion. 
무료 다운로드
연락처 정보를 입력하고 다운로드 버튼을 클릭하십시오. 다운로드 링크가 포함된 이메일이 발송됩니다.
I consent to B2B Media Group GmbH with its affiliated companies and Proofpoint Ltd processing my data for marketing purposes, in particular for marketing-related contact via email and telephone.

You can withdraw your consent at any time by emailing privacy@b2bmg.com (subject: Proofpoint Ltd). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • Proofpoint Ltd
* 표시된 영역은 필수입니다