The prevalence of video conferencing is changing the way we conduct business. As we adapt to this new meeting practice, cybercriminals are adapting as well. The recent surge in use of cloud-based video conferencing technologies creates opportunities for cybercriminals to reengineer their phishing tactics.
Every morning we log on to our corporate email and begin the day sifting through a myriad of emails, most of which are equally important and needing action. Likely, you haven't even finished your first cup of coffee and not focused on the cybercriminal who is hoping you will respond to their highly sophisticated phishing email waiting in your Inbox. So how do you recognize and react to the myriad of fake emails coming at you multiple times a day?
Has anyone at your organization ever received an email that was not what they thought it would be? Maybe it was a message from a vendor looking to verify sensitive account information; a message from an accountant sending completed tax returns in the month of August; or, a note from what appears to be from your healthcare insurance company asking you to confirm your date of birth in order to process a claim?