Phishing, Whaling & The Surprising Importance Of Privileged Users | DarkReading Article

Joe_OpackiBy bagging a privileged user early on, attackers can move from entry point to mission accomplished in no time at all.

 In the world of cybersecurity, there are two wildly different approaches to phishing, according to Joseph Opacki, VP, Threat Research, PhishLabs.

The first, which we subscribe to, recognizes the threat posed to organizations by phishing attacks, and seeks to defend against it by both educating employees and tightening internal controls. In those cases where a phishing attack is successful, our camp aims to eliminate the threat as quickly as possible, and then learn from it.

The second approach is quite different. Click here for full article