Third Party Phishing: The New Spear-Phishing Attacks That Traditional Defenses Just Don't Stop

Spear-Phishing-WebinarJoe in accounting is pretty cyber-savvy. He doesn’t fall for basic phishing emails with masked URLs or phony password reset requests. But what happens when Joe gets an email from a trusted third-party vendor disputing a recent payment and demanding action? If that third-party vendor has been compromised it could very well be the bad guys sending Joe a spear-phishing attack from the vendor’s domain. And if it is, you could be in trouble. Big trouble...

Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.

Join Erich Kron, Security Awareness Advocate at KnowBe4, to see:

  • Real third-party phishing schemes
  • Why traditional defenses won’t stop them
  • Ways to identify a third-party attack
  • How to build a strong human firewall
  • Actionable steps you can take now to protect your network

Watch Now

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Comprehensive Anti-Phishing Guide

Get the latest about social engineering

Subscribe to CyberheistNews