While we’re all trying to adapt to the new “work from home” reality, hackers are eagerly seizing the opportunity to get into your network through your expanded attack surface. So far, most attacks are aimed at exploiting the lack of proper IT security hygiene practices among remote workers. The key to protecting your valuable assets is knowing exactly what types of attacks to look for.
By the end of this session, you will know:
- Common tactics and techniques that exploit the anxieties and weaknesses of remote employees, including credential phishing, malicious attachments and links in emails, and websites infected with malware
- 5 things you need to closely monitor to prevent data breaches
- Ways to identify compromised accounts and brute-force intrusion attempts