1.2 Common Threats in Corporate Environments
-
Business Email Compromise (BEC):
A sophisticated scam where attackers compromise legitimate business email accounts
to conduct unauthorized transfers of funds. BEC is often “malware-free,” relying
entirely on social manipulation. -
Insider Threats:
-
Malicious Insider:
A disgruntled employee stealing IP (Intellectual Property) before leaving
to a competitor. -
Negligent Insider:
A well-meaning employee who bypasses security policies
(e.g., emailing sensitive data to a personal Gmail account)
to “get the job done” faster.
-
Malicious Insider:
-
Supply Chain Attacks:
Attackers breach a third-party vendor (e.g., an HVAC provider or payroll processor)
to gain access to your network. You are only as secure as your least secure vendor.