By exploiting a user’s weak or stolen credentials or getting a user to click on a malicious link within an email, attackers can easily gain access to your network and remain undiscovered for a longer period of time.
This webinar will explore the anatomy of a user-based attack, including how to:
- Look for suspicious user patterns and behaviours;
- Detect indicators of compromised user accounts;
- Diagnose an attacker’s entry and lateral movements within the network;
- How to educate users to look out for malicious links and phishing