This resource is no longer available

Cover Image

Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization.

They will typically request money via wire transfer, but they may also request personnel files or other sensitive information. Read this white paper to see some examples.

Vendor:
Inky Technology
Posted:
Feb 8, 2021
Published:
Oct 2, 2020
Format:
PDF
Type:
White Paper

This resource is no longer available.