![]() |
Cyber Security Landscape
|
*** Attack Methods - Business Email Impersonation *** A scammer sets up an email address that looks like its from your company Then the scammer sends out messages using that email address. This practice is called spoofing, and the scammer is what we call a business email imposter Scammers do this to get passwords and bank account numbers or to get someone to send them money. When this happens, your company has a lot to lose. Customers and partners might lose trust and take their business elsewhere — and your business could then lose money
|
![]() |
Mapped Buisness Risks | ||||||
Brand Damage | Data/Secret Loss | Service Disruption |
Mapped Cyber Risks | ||||||
Data Security / Loss | Extortion | Human Error | Identity/Password Protection |
Mapped Mitigation Methods | ||||||
Protect Data | Manage Risks, Compliance and Controls | Manage Threats & Vulnerabilities | Enable Visibility |
Mapped Products | ||||||
Cyberark Alero | Okta Advanced Server Access |
Mapped OEMs | ||||||
Cyberark | Okta |