Comments

  1. Hello,
    You mention a phishing prevention system used by one organisation. Is this a technical control? Can you please provide more any more details of what this is / how it works?

    • Astra IDentity’s PhishingGuardian software uses patented technologies to combine big data processing and behavioral analytics to protect employees against emails that may be from imposters. A hacker targeting a certain company uses social networks and other Internet data to find employees with access to the company’s data or systems. The hacker identifies other people the employees may know and then creates a fake but recognizable email address to impersonate a colleague or boss. Astra IDentity’s software guards against this by monitoring a company’s email traffic and building a “behavioral fingerprint” based on the communication pattern of employees and their contacts, such as whether the sender typically uses a computer, smartphone or tablet; what geography the sender’s emails come from; and whether the sender’s emails usually contain typos. PhishingGuardian then crunches all this data, comparing incoming emails to the fingerprint, and alerts employees or the company about emails from potential imposters. Let me know if you’d like more information or an introduction.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of the author. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided "as-is". The author shall not be liable for any damages whatsoever arising out of the content or use of this blog.
%d bloggers like this: