by EW in
Recent News

Source: https://cybersecurity.att.com/blogs/security-essentials/stories-from-the-soc-fighting-back-against-credential-harvesting-with-proofpoint

• Analyze & Identify the Incident
• Find the Root Cause of the Incident
• Identify Indicators of Compromise
• Make Recommendations for Mitigation/Remediation
• Execute Necessary Actions
• Communicate with the Customer
• Follow Incident Response Process
• Implement Multi-Factor Authentication
• Educate Employees on Spotting Phishing Techniques
• Use URL Defense Feature to Block Malicious Links
• Quarantine Email & Attachments
• Block the URL
• Scan the Affected Device with Antivirus

Share Post:

Related Posts

No Comments

Leave a Reply