Fri. Apr 26th, 2024
ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.
 

Extract from article by Adam Vincent

Even with a strong information-sharing community in place, there’s always one phish that’s going to slip through the net. When you’re dealing with the engineering of human behavior, it’s probably going to happen. In the case of business attacks, phishing emails are often designed to collect login details from employees. Once these logins are surrendered, the hacker is a step closer to accessing multiple company systems.

With the prevalence of poor password hygiene to boot, there’s an added possibility that credentials have been reused across multiple other platforms. A single successful phish can open up the whole enterprise to attack.

As a security professional, you’re going to want a system in place to monitor activity across all security channels and infrastructure. Firewalls and anti-virus can only get you so far. Instead, companies need to collect information and analyze it for potentially dangerous activity.

It may be a few hours before a phishing-related breach is reported, but in that time, a fully automated threat intelligence system can gather and assess indicators of unusual activity, alert the security team and initiate a response.

Phishing can unlock a considerable amount of resources to a hacker. Businesses must have a complete and automated view of everything in their system, or they could be gutted before they’ve had time to think.

 

Have a Request?

If you have information or offering requests that you would like to ask us about, please let us know, and we will make our response to you a priority.

ComplexDiscovery OÜ is a highly recognized digital publication focused on providing detailed insights into the fields of cybersecurity, information governance, and eDiscovery. Based in Estonia, a hub for digital innovation, ComplexDiscovery OÜ upholds rigorous standards in journalistic integrity, delivering nuanced analyses of global trends, technology advancements, and the eDiscovery sector. The publication expertly connects intricate legal technology issues with the broader narrative of international business and current events, offering its readership invaluable insights for informed decision-making.

For the latest in law, technology, and business, visit ComplexDiscovery.com.

 

Generative Artificial Intelligence and Large Language Model Use

ComplexDiscovery OÜ recognizes the value of GAI and LLM tools in streamlining content creation processes and enhancing the overall quality of its research, writing, and editing efforts. To this end, ComplexDiscovery OÜ regularly employs GAI tools, including ChatGPT, Claude, Midjourney, and DALL-E, to assist, augment, and accelerate the development and publication of both new and revised content in posts and pages published (initiated in late 2022).

ComplexDiscovery also provides a ChatGPT-powered AI article assistant for its users. This feature leverages LLM capabilities to generate relevant and valuable insights related to specific page and post content published on ComplexDiscovery.com. By offering this AI-driven service, ComplexDiscovery OÜ aims to create a more interactive and engaging experience for its users, while highlighting the importance of responsible and ethical use of GAI and LLM technologies.