While using cleverly-worded emails has been the tool-of-choice for would-be attackers, there are other ways to infect users that are equally effective.
Nearly all strategies rely on user behavior: either a phishing email convinces them to open an attached file, or they are directed to a seemingly legitimate site, or the user is surfing the web for some piece of latest news or subject of interest. In our last blog we looked at the infected attachment, and how advanced threat detection can help deter these attacks. But something like ATD won’t help you when the infection lives on the internet.
Rich is the Product Marketing Manager, Information Management. He's been with Barracuda since the acquisition of C2C Systems in 2014. Rich specializes in cloud-deployed solutions, information management, and archiving systems. His experience includes extensive work on OEM opportunities and the legal community.
You can email Rich at firstname.lastname@example.org.