Spear Phishing Protection | Phishing Protection
Personal Data Warning
"Vendors that specialize in content inspection will be more successful in detecting these types of attacks than those that rely on reputation."
Spear phishing is a targeted attack against a single victim by a hacker. Spear phishing is also known as:
- Business Email Compromise (BEC): A business email compromise is a spear phishing attack aimed at a controller, accountant, or bookkeeper aimed at convincing them to send funds for a bogus business transaction.
- CEO Fraud: A specific variant of the business email compromise where the emails are purportedly from the CEO of a company asking for funds to be immediately wired to a fraudulent account for a purported merger or payment for a very important vendor.
- Whaling: Whaling is a spear phishing attack aimed at an especially valuable target such as a CEO, important political figure, or extremely high value security credentials.
In a typical spear phishing attack, a hacker will attempt to fool the recipient by engaging in an email conversation and gaining trust before requesting sensitive personal information (such as business credentials). These advanced spear phishing tactics usually don’t contain suspicious attachments and hyperlinks—which makes them difficult to spot by standard phishing and spam filters. Spear Phishing attacks generally go for high value targets which make them especially dangerous. 91% of all network attacks are driven at least partly by successful spear phishing attacks.
Spear Phishing is, by far, the most dangerous attack vector against your network.
Spear phishing attacks are customized and target a specific individual, while phishing attacks are generally sent as mass generic emails containing malware in the form of attachments, URLs, generic scams like the infamous "Nigerian prince" scam.
However, spear phishing attacks just look like regular emails to standard email security systems. it requires specialized spear phishing protection to stop these sophisticated attacks.
Vade Secure's anti-spoofing feature, Identity Match TM, combines a technical analysis as well as content and style analysis of each email to ensure that every sender is who they say they are.
All links and attachments are individually quarantined and examined to ensure that they are safe. What's more, our system alerts users with a special banner whenever someone is requesting suspicious or confidential information.
Vade Secure's patented Identity MatchTM system is the result of millions of email analyses performed each and every day for over a decade. Identity Match TM considers hundreds of subtle technical and behavioral factors to determine if the sender is who they claim to be.
Using artificial intelligence, Vade Secure performs a deep analysis of every email you receive to look for attempts from hackers to steal your personal information. Our fully integrated banner alerts let both administrators and users know when something suspicious has been discovered. Vade Secure's unique artificial intelligence means that we can reliably catch even zero-day vulnerabilities.