Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

How an attacker can target phishing attacks

31st July 201931st July 2019 peterglock

There are a number of ways attackers can exploit public information about your organization’s employees. CSO Online’s Susan Bradley walks through how an attacker can gain access to your organization’s Office 365 accounts and how you can protect your enterprise from these potential attacks.

Read the original article here

network world Glock Takes Stock permalink

Post navigation

← Exploit kits: summer 2019 review
People care more about how their personal data is used. But what aspects cause them most concern? →

Recent Posts

  • Google Alerts continues to be a hotbed of scams and malware
  • Sustaining IT resiliency in the face of a ransomware attack
  • C&C subsidiary suffers cyber-security incident
  • Local firm develops AI computer drive to thwart hackers
  • 23% online users always allow apps and services access to microphones or webcams

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

5 hours ago

Glock Enterprises Ltd
buff.ly/3syJEjcC&C subsidiary suffers cyber-security incidentJust as the weather is improving and we're beginning to hope for outdoor events this summer where Cider is the tipple of choice for many...[...] Drinks group C&C has said its wholly-owned subsidiary Matthew Clark Bibendum (MCB) became aware on Friday that it was the subject of a cyber-security incident.The Bulmers-owner said the incident impacted both the Matthew Clark and Bibendum arms of the company.Matthew Clark is a national drinks wholesaler, supplying drinks products, training and marketing support to thousands of premises across the UK.Bibendum is a London-based premium wine, beers and spirits merchant. It has a portfolio of 260 wine producers, and sells an extensive range of premium spirits, craft beers, ciders and sakes. It supplies customers across the UK and Ireland.C&C said MCB “responded quickly” on Friday, enacting its cyber-security response plan and shutting down all of its IT systems.[...]Original article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes