In this case, the actions we take will be done on the advice of the customer’s legal team and will be designed to establish a legal framework for prosecution. We have to recognize that there are two basic approaches to the problem: Watch what the bad guy does so that you can take legal action against them If an account in your Office 365 environment is compromised in this way, what can you do? Or maybe the bad guy wants to have access to the environment so that he can gather confidential information and misuse it. Maybe their goal is to use that email account to send spam email or access organizational data for exfiltration. In many cases, the goal of the attacker is to compromise a user account – ANY user account – and then move forward from there. One of your end users might click on a link that they shouldn’t and they get sent to a location where a piece of malware is installed on their machine and it captures their user credentials. We live in a world full of nasty threats to our online environments. David Branscome Partner Technical Architect
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
August 2023
Categories |