SlideShare uma empresa Scribd logo
1 de 46
Dealing with a Spoof mail attack and Phishing
mail attacks | A little story with a sad end
Part 1/9
Eyal Doron o365info.com
The common feeling of IT persons is –
that they know and understand everything that is
related to security and threats in their environment.
Eyal Doron o365info.com
The simple truth is that most of the time, we don t really
have any idea, about the threats and dangers that exist,
and what is happening under our noses.
Eyal Doron o365info.com
You fell a powerful header which brings down the floor
Eyal Doron o365info.com
In each security event, in which we discover the
damage which was caused by the Spoof  Phishing
mail attacks, we act the same – panic!
Eyal Doron o365info.com
Shout and scream anyone you can!
Eyal Doron o365info.com
The silent grief phase
Eyal Doron o365info.com
The only difference between those events that
organizations experience is - the faces and the names of
the people who are involved in the process.
The little story
about Jeff
Eyal Doron o365info.com
Let me tell you a story that happened long
long ago in a far away land
Eyal Doron o365info.com
Scene number 1/9
1
2 3 4 5 6 7 8 9
Eyal Doron o365info.com
It's 9:30 in the morning; the sun is shining.
In our little story, your name is Jeff, and you are the CIO of a
company that belongs to the financial sector named –
Don t do anything and hope that everything will work
out by itself .
Eyal Doron o365info.com
You're sitting in your Office, drinking a cup of hot coffee
(no sugar because you need to maintain your weight).
You log on to Facebook, and start to watch some
boring video of a dog or a cat doing something.
Eyal Doron o365info.com
Your phone is ringing.
Your gut feeling is telling you that something
is wrong!
On the line is Suzan, the personal assistant of Brad, the company CEO.
Suzan is asking you to urgently come to Brad s office.
Eyal Doron o365info.com
The facial expression of Brad is grave and serious.
This morning, after a brief conversation with David,
I understand that I was a victim of an ugly fraud!
You enter Brad s room.
Brad asks you to close the door behind you.
Brad says:
"Jeff, let's make it simple and straight-forward.
Yesterday, I got an E-mail message from David (David is the company CFO)
that asked me to deposit 500, 000$ in a specific bank account.
The purpose of the deposit was an initial payment for a big acquisition deal,
which is about to take place soon.
Eyal Doron o365info.com
1. I want my money back!
2. I want you to locate the person that carried out this ugly
fraud + report the information to the police!
Eyal Doron o365info.com
3. I demand to know - how can it be that our security
infrastructure that costs us so much money, didn t
recognize and blocked this attack, and I demand to know
who to blame, and who is the person that is
responsible for this failure!
Eyal Doron o365info.com
3 4 5 6 7 8 9
2
1
Scene number 2/9
Eyal Doron o365info.com
You can hear your heart pounding.
Eyal Doron o365info.com
Billy enters your office.
You ask Billy to close the door behind him.
You instantly call Billy (the company IT manager), and ask him
firmly to reach your office immediately!
Eyal Doron o365info.com
You inform Billy about the "mess", waving your finger in his face.
You inform Billy that you need instant answers and that
someone will have to pay the price!
Eyal Doron o365info.com
4 5 6 7 8 91 2
3
Scene number 3/9
Eyal Doron o365info.com
Billy rushes into his office, finds Bob (the Help desk manager), and
informs him about the "issue".
Billy asks Bob to call the IT company that planned and built our mail infrastructure
immediately, and inform them that they will have to provide an accurate answer
to the following questions:
Eyal Doron o365info.com
1. How did the hostile element manage to hack our system, despite the advanced
security infrastructure that was supposed to protect our mail infrastructure?
2. How to identify with certainty the hostile element, and locate the hostile element
which carried out the attack?
3. How are they going to compensate us for the Indignities and the financial losses?
Eyal Doron o365info.com
5 6 7 8 91 2 3
4
Scene number 4/9
Eyal Doron o365info.com
Bob calls the technical support of the IT company that built our mail
infrastructure, informs them about the incident that happened, and
present the list of questions.
Eyal Doron o365info.com
The "other side", explains that this problem
is not related to "their side" in any way, and that the responsibility for
protecting the organization mail infrastructure from such attack, is the
responsibility of the organization that owns the mail infrastructure
meaning, our responsibility.
Eyal Doron o365info.com
After an exchange of harsh words, Bob disconnects the
call and informs Billy that the provider, refuses to help
us and in addition, blames us for the "mess".
Eyal Doron o365info.com
6 7 8 91 2 3 4
5
Scene number 5/9
Eyal Doron o365info.com
Billy (the company IT manager) picks up the phone and calls the
technical support of the provider who built our mail infrastructure.
Billy asks politely but firmly to talk to Stephen,
the manager!
Eyal Doron o365info.com
Stephen explains that this problem is not related to "their side" in any
way, and that responsibility for protecting the organization mail
infrastructure from such attack, is the
responsibility of the organization who owns and manages the mail
infrastructure.
Eyal Doron o365info.com
After an exchange of harsh words, Billy disconnects the call.
Eyal Doron o365info.com
7 8 91 2 3 4 5
6
Scene number 6/9
Eyal Doron o365info.com
The bottom line – Stephen that represents the IT company that
built our mail infrastructure declares that – they are not willing
to take any kind of responsibility for this mess!
Billy calls you (just a quick reminder; you are Jeff the company
CIO) and reports on the conversation with Stephen.
Eyal Doron o365info.com
You ordered Billy to immediately summon a
conference call, that includes yourself, Billy
(the company IT manager) and Stephen.
Eyal Doron o365info.com
You start the phone conversation with some statement
about the fact that you have decades of experience in
the field (usually, the magic number is 15 years).
Eyal Doron o365info.com
You continue to the "threats phase", and clarify unambiguously that if he (the
provider) will not take responsibility, provide immediate answers and solve the
mess, you will:
fire him
sue him and in addition
publish negative information about his company on Facebook.
Eyal Doron o365info.com
Stephen says that he is very sorry, that he understands my pain, but
nothing he can do to help us in this scenario.
Eyal Doron o365info.com
8 91 2 3 4 5
Scene number 7/9
6
7
Eyal Doron o365info.com
You start to stutter and mumble about security risks, cyber-
attacks, the difficulty in dealing with the risks and threats of
the modern work environment.
You enter the office of the CEO with heavy steps
Eyal Doron o365info.com
Brad (your CEO) informs you that you will have drawn the
required conclusions.
Eyal Doron o365info.com
91 2 3 4 5 6 7
8
Scene number 8/9
Eyal Doron o365info.com
Two years passed since you have been fired following the unfortunate incident.
You could not find another job (because of age and other reasons).
Your financial situation is not good, and you get a call from the bank on a daily basis.
After many reflections and obsessive thoughts, you decide that .
Eyal Doron o365info.com
1 2 3 4 5 6 7 8
9
Scene number 9/9
Eyal Doron o365info.com
The wind blows in your face.
You're standing on a high bridge looking into the abyss which
pours down!
Goodbye cruel world!
Dealing with a spoof mail attacks and phishing mail attacks   a little story with a sad end - part 1#9 | Eyal Doron | o365info.com

Mais conteúdo relacionado

Destaque

Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013
Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013
Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013t575ae
 
Cсправочник по продукции LR
Cсправочник по продукции LRCсправочник по продукции LR
Cсправочник по продукции LRt575ae
 
Seminario biologia molecular l. donovani
Seminario biologia molecular  l. donovaniSeminario biologia molecular  l. donovani
Seminario biologia molecular l. donovaniAna Parada
 
Hurricane Sandy Mount Loretto
Hurricane Sandy Mount LorettoHurricane Sandy Mount Loretto
Hurricane Sandy Mount Lorettotonymaull92
 
Vippis
VippisVippis
Vippisbradhe
 
Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Ved Prakash Gupta
 
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!Fantuz
 

Destaque (15)

Task 4.3 ts
Task 4.3 tsTask 4.3 ts
Task 4.3 ts
 
Kurt’s biography
Kurt’s biographyKurt’s biography
Kurt’s biography
 
Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013
Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013
Прайс лист LR HEALTH&BEAUTY SYSTEMS 02-2013
 
Cсправочник по продукции LR
Cсправочник по продукции LRCсправочник по продукции LR
Cсправочник по продукции LR
 
MoDevUx Brain Secrets
MoDevUx Brain SecretsMoDevUx Brain Secrets
MoDevUx Brain Secrets
 
Rpt btsk tahun 1
Rpt btsk tahun 1 Rpt btsk tahun 1
Rpt btsk tahun 1
 
Seminario biologia molecular l. donovani
Seminario biologia molecular  l. donovaniSeminario biologia molecular  l. donovani
Seminario biologia molecular l. donovani
 
Welcome to bus. comm. 01
Welcome to bus. comm. 01Welcome to bus. comm. 01
Welcome to bus. comm. 01
 
3 magazine cover analysis
3 magazine cover analysis3 magazine cover analysis
3 magazine cover analysis
 
Il futuro
Il futuroIl futuro
Il futuro
 
Hurricane Sandy Mount Loretto
Hurricane Sandy Mount LorettoHurricane Sandy Mount Loretto
Hurricane Sandy Mount Loretto
 
Question 4
Question 4Question 4
Question 4
 
Vippis
VippisVippis
Vippis
 
Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012Internship Report_IDRBT, Hyderabad_2012
Internship Report_IDRBT, Hyderabad_2012
 
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!
La testa di stampa GraphJet Zanasi copie i suoi primi 10 anni!
 

Mais de Eyal Doron

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2Eyal Doron
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...Eyal Doron
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...Eyal Doron
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...Eyal Doron
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.comEyal Doron
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...Eyal Doron
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...Eyal Doron
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7Eyal Doron
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...Eyal Doron
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...Eyal Doron
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...Eyal Doron
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4Eyal Doron
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4Eyal Doron
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36Eyal Doron
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36Eyal Doron
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...Eyal Doron
 

Mais de Eyal Doron (20)

How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2How to simulate spoof e mail attack and bypass spf sender verification - 2#2
How to simulate spoof e mail attack and bypass spf sender verification - 2#2
 
How does sender verification work how we identify spoof mail) spf, dkim dmar...
How does sender verification work  how we identify spoof mail) spf, dkim dmar...How does sender verification work  how we identify spoof mail) spf, dkim dmar...
How does sender verification work how we identify spoof mail) spf, dkim dmar...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...Why our mail system is exposed to spoof and phishing mail attacks  part 5#9 |...
Why our mail system is exposed to spoof and phishing mail attacks part 5#9 |...
 
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...What is the meaning of mail phishing attack in simple words   part 4#9 | Eyal...
What is the meaning of mail phishing attack in simple words part 4#9 | Eyal...
 
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.comWhat is so special about spoof mail attack  part 3#9 | Eyal Doron | o365info.com
What is so special about spoof mail attack part 3#9 | Eyal Doron | o365info.com
 
What are the possible damages of phishing and spoofing mail attacks part 2#...
What are the possible damages of phishing and spoofing mail attacks   part 2#...What are the possible damages of phishing and spoofing mail attacks   part 2#...
What are the possible damages of phishing and spoofing mail attacks part 2#...
 
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
Dealing with a spoof mail attacks and phishing mail attacks   a little story ...Dealing with a spoof mail attacks and phishing mail attacks   a little story ...
Dealing with a spoof mail attacks and phishing mail attacks a little story ...
 
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
Exchange In-Place eDiscovery & Hold | Introduction  | 5#7Exchange In-Place eDiscovery & Hold | Introduction  | 5#7
Exchange In-Place eDiscovery & Hold | Introduction | 5#7
 
Mail migration to office 365 measure and estimate mail migration throughput...
Mail migration to office 365   measure and estimate mail migration throughput...Mail migration to office 365   measure and estimate mail migration throughput...
Mail migration to office 365 measure and estimate mail migration throughput...
 
Mail migration to office 365 factors that impact mail migration performance...
Mail migration to office 365   factors that impact mail migration performance...Mail migration to office 365   factors that impact mail migration performance...
Mail migration to office 365 factors that impact mail migration performance...
 
Mail migration to office 365 optimizing the mail migration throughput - par...
Mail migration to office 365   optimizing the mail migration throughput - par...Mail migration to office 365   optimizing the mail migration throughput - par...
Mail migration to office 365 optimizing the mail migration throughput - par...
 
Mail migration to office 365 mail migration methods - part 1#4
Mail migration to office 365   mail migration methods - part 1#4Mail migration to office 365   mail migration methods - part 1#4
Mail migration to office 365 mail migration methods - part 1#4
 
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4Smtp relay in office 365 environment   troubleshooting scenarios - part 4#4
Smtp relay in office 365 environment troubleshooting scenarios - part 4#4
 
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36Stage migration, exchange and autodiscover infrastructure  part 1#2  part 35#36
Stage migration, exchange and autodiscover infrastructure part 1#2 part 35#36
 
Autodiscover flow in an office 365 environment part 3#3 part 31#36
Autodiscover flow in an office 365 environment  part 3#3  part 31#36Autodiscover flow in an office 365 environment  part 3#3  part 31#36
Autodiscover flow in an office 365 environment part 3#3 part 31#36
 
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36Autodiscover flow in an exchange hybrid environment  part 1#3  part 32#36
Autodiscover flow in an exchange hybrid environment part 1#3 part 32#36
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 
Autodiscover flow in an exchange on premises environment non-active director...
Autodiscover flow in an exchange on premises environment  non-active director...Autodiscover flow in an exchange on premises environment  non-active director...
Autodiscover flow in an exchange on premises environment non-active director...
 

Último

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 

Último (20)

On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 

Dealing with a spoof mail attacks and phishing mail attacks a little story with a sad end - part 1#9 | Eyal Doron | o365info.com

  • 1. Dealing with a Spoof mail attack and Phishing mail attacks | A little story with a sad end Part 1/9
  • 2. Eyal Doron o365info.com The common feeling of IT persons is – that they know and understand everything that is related to security and threats in their environment.
  • 3. Eyal Doron o365info.com The simple truth is that most of the time, we don t really have any idea, about the threats and dangers that exist, and what is happening under our noses.
  • 4. Eyal Doron o365info.com You fell a powerful header which brings down the floor
  • 5. Eyal Doron o365info.com In each security event, in which we discover the damage which was caused by the Spoof Phishing mail attacks, we act the same – panic!
  • 6. Eyal Doron o365info.com Shout and scream anyone you can!
  • 7. Eyal Doron o365info.com The silent grief phase
  • 8. Eyal Doron o365info.com The only difference between those events that organizations experience is - the faces and the names of the people who are involved in the process.
  • 10. Eyal Doron o365info.com Let me tell you a story that happened long long ago in a far away land
  • 11. Eyal Doron o365info.com Scene number 1/9 1 2 3 4 5 6 7 8 9
  • 12. Eyal Doron o365info.com It's 9:30 in the morning; the sun is shining. In our little story, your name is Jeff, and you are the CIO of a company that belongs to the financial sector named – Don t do anything and hope that everything will work out by itself .
  • 13. Eyal Doron o365info.com You're sitting in your Office, drinking a cup of hot coffee (no sugar because you need to maintain your weight). You log on to Facebook, and start to watch some boring video of a dog or a cat doing something.
  • 14. Eyal Doron o365info.com Your phone is ringing. Your gut feeling is telling you that something is wrong! On the line is Suzan, the personal assistant of Brad, the company CEO. Suzan is asking you to urgently come to Brad s office.
  • 15. Eyal Doron o365info.com The facial expression of Brad is grave and serious. This morning, after a brief conversation with David, I understand that I was a victim of an ugly fraud! You enter Brad s room. Brad asks you to close the door behind you. Brad says: "Jeff, let's make it simple and straight-forward. Yesterday, I got an E-mail message from David (David is the company CFO) that asked me to deposit 500, 000$ in a specific bank account. The purpose of the deposit was an initial payment for a big acquisition deal, which is about to take place soon.
  • 16. Eyal Doron o365info.com 1. I want my money back! 2. I want you to locate the person that carried out this ugly fraud + report the information to the police!
  • 17. Eyal Doron o365info.com 3. I demand to know - how can it be that our security infrastructure that costs us so much money, didn t recognize and blocked this attack, and I demand to know who to blame, and who is the person that is responsible for this failure!
  • 18. Eyal Doron o365info.com 3 4 5 6 7 8 9 2 1 Scene number 2/9
  • 19. Eyal Doron o365info.com You can hear your heart pounding.
  • 20. Eyal Doron o365info.com Billy enters your office. You ask Billy to close the door behind him. You instantly call Billy (the company IT manager), and ask him firmly to reach your office immediately!
  • 21. Eyal Doron o365info.com You inform Billy about the "mess", waving your finger in his face. You inform Billy that you need instant answers and that someone will have to pay the price!
  • 22. Eyal Doron o365info.com 4 5 6 7 8 91 2 3 Scene number 3/9
  • 23. Eyal Doron o365info.com Billy rushes into his office, finds Bob (the Help desk manager), and informs him about the "issue". Billy asks Bob to call the IT company that planned and built our mail infrastructure immediately, and inform them that they will have to provide an accurate answer to the following questions:
  • 24. Eyal Doron o365info.com 1. How did the hostile element manage to hack our system, despite the advanced security infrastructure that was supposed to protect our mail infrastructure? 2. How to identify with certainty the hostile element, and locate the hostile element which carried out the attack? 3. How are they going to compensate us for the Indignities and the financial losses?
  • 25. Eyal Doron o365info.com 5 6 7 8 91 2 3 4 Scene number 4/9
  • 26. Eyal Doron o365info.com Bob calls the technical support of the IT company that built our mail infrastructure, informs them about the incident that happened, and present the list of questions.
  • 27. Eyal Doron o365info.com The "other side", explains that this problem is not related to "their side" in any way, and that the responsibility for protecting the organization mail infrastructure from such attack, is the responsibility of the organization that owns the mail infrastructure meaning, our responsibility.
  • 28. Eyal Doron o365info.com After an exchange of harsh words, Bob disconnects the call and informs Billy that the provider, refuses to help us and in addition, blames us for the "mess".
  • 29. Eyal Doron o365info.com 6 7 8 91 2 3 4 5 Scene number 5/9
  • 30. Eyal Doron o365info.com Billy (the company IT manager) picks up the phone and calls the technical support of the provider who built our mail infrastructure. Billy asks politely but firmly to talk to Stephen, the manager!
  • 31. Eyal Doron o365info.com Stephen explains that this problem is not related to "their side" in any way, and that responsibility for protecting the organization mail infrastructure from such attack, is the responsibility of the organization who owns and manages the mail infrastructure.
  • 32. Eyal Doron o365info.com After an exchange of harsh words, Billy disconnects the call.
  • 33. Eyal Doron o365info.com 7 8 91 2 3 4 5 6 Scene number 6/9
  • 34. Eyal Doron o365info.com The bottom line – Stephen that represents the IT company that built our mail infrastructure declares that – they are not willing to take any kind of responsibility for this mess! Billy calls you (just a quick reminder; you are Jeff the company CIO) and reports on the conversation with Stephen.
  • 35. Eyal Doron o365info.com You ordered Billy to immediately summon a conference call, that includes yourself, Billy (the company IT manager) and Stephen.
  • 36. Eyal Doron o365info.com You start the phone conversation with some statement about the fact that you have decades of experience in the field (usually, the magic number is 15 years).
  • 37. Eyal Doron o365info.com You continue to the "threats phase", and clarify unambiguously that if he (the provider) will not take responsibility, provide immediate answers and solve the mess, you will: fire him sue him and in addition publish negative information about his company on Facebook.
  • 38. Eyal Doron o365info.com Stephen says that he is very sorry, that he understands my pain, but nothing he can do to help us in this scenario.
  • 39. Eyal Doron o365info.com 8 91 2 3 4 5 Scene number 7/9 6 7
  • 40. Eyal Doron o365info.com You start to stutter and mumble about security risks, cyber- attacks, the difficulty in dealing with the risks and threats of the modern work environment. You enter the office of the CEO with heavy steps
  • 41. Eyal Doron o365info.com Brad (your CEO) informs you that you will have drawn the required conclusions.
  • 42. Eyal Doron o365info.com 91 2 3 4 5 6 7 8 Scene number 8/9
  • 43. Eyal Doron o365info.com Two years passed since you have been fired following the unfortunate incident. You could not find another job (because of age and other reasons). Your financial situation is not good, and you get a call from the bank on a daily basis. After many reflections and obsessive thoughts, you decide that .
  • 44. Eyal Doron o365info.com 1 2 3 4 5 6 7 8 9 Scene number 9/9
  • 45. Eyal Doron o365info.com The wind blows in your face. You're standing on a high bridge looking into the abyss which pours down! Goodbye cruel world!

Notas do Editor

  1. In the current article, I would like to review the chain of events that occurs every time, again and again, in a scenario in which the attacker manages to successfully execute a Phishing mail attack. The reaction of the involved persons is known in advance, and the sad end of the story is known in advance. The main goal of the story is - to serve as a wakeup call, so you do not have to be a character in the play of – Phishing mail attack!   The major challenges relating to the subject of Spoof mail attack and Phishing mail attacks are The fact the Phishing mail attack is a sophisticated attack that includes many parts that will need to deal with each one of them separately such as – Spoof mail attack. Our ignorance about the way the Phishing mail attack work and executed. Our fake confidence which is based on our mistaken assumption that our mail infrastructure is protected and can deal with all this “mambo jumbo attack” stuff. Why are we so arrogant? The common denominator of IT people is - the strong believe, that he is some kind of Albert Einstein, that knows everything there is to know about IT and security.
  2. If we have the courage to admit, most of us not really know what is the meaning of Phishing mail attack, what are the characters of Phishing mail attack, what are the different flavor of Phishing mail attack, what is the difference between spam mail, Phishing mail attack or a Spoof E-mail.
  3. The bitter truth appears when and where we least expect it! Your organization experiences a successful Phishing mail attack, in which the attacker manages to cause a huge damage to our organization. You feel like a bull rammed you!
  4. The next emotion in our emotional rollercoaster is "panic." We don’t know what is volume of damage, we don’t know if our network was infected with malicious code to continue to damage our organization or, just sit and wait for the right opportunity. The real reason of the “panic” is the very reasonable suspicion that his ass is on fire!
  5. The next emotion in our emotional rollercoaster is "anger." The source for the "anger," is frustration. The source of the frustration is because: We didn’t manage to identify and block the attack. The fact that we are faced with the simple truth, that says that we are not so smart as we thought. The anger outcome is - shouting and screaming at everyone below us or any other person that who we can shout. One of the most popular “objects” for channeling our frustration is - the companies, that provide us some kind of service because, most of the time they will not answer back.
  6. This is the last phase of our bad trip, which I describe as the "the silent grief phase." This is the phase in which we manage to understand and accept that there is nothing that we can do besides of accept the reality, and understand that the attacker was smart enough to revel in our weak spot.
  7. The conclusion The drama which was described is not so special or unique to a specific origination. It happened all the time to many organizations. The only difference between the events is the name and the faces of the people that are involved.
  8. Let me tell you a story that happened long long time ago in a distant land.
  9. Scene number 1 In our little story, your name is Jeff, and you are the CIO of a company that belongs to the financial sector named – “Don’t do anything and hope that everything will work out by itself."   It's 9:30 in the morning; the sun is shining. You're sitting in your office, drinking a cup of hot coffee (no sugar because you need to maintain your weight).  
  10. You log on to Facebook, and start to watch some boring video of a dog or a cat, doing something.  
  11. Your phone is ringing. On the line is Suzan, the personal assistant of Brad, the company CEO. Suzan is asking you to urgently come to Brad’s office.
  12. Your gut feeling is telling you that something is wrong! You enter the Brad’s room. Brad asks you to close the door behind you. The facial expression of Brad is grave and serious. Brad says: "Jeff, let's make it simple and straight-forward. Yesterday, I got an E-mail message from David (David is the company CFO) that asked me to deposit 500, 000$ in a specific bank account. The purpose of the deposit was an initial payment for a big acquisition deal, which is about to take place soon.” This morning, after a brief conversation with David, I understand that I was a victim of an ugly fraud!  
  13. 1. I want my money back! 2. I want you to locate the persons that carried out this ugly fraud + report the information to the police!  
  14. 3. I demand to know - how can it be that our security infrastructure that costs us so much money, didn’t recognize and blocked this attack, and I demand to know who to blame and who is the person that is responsible for this disaster!
  15.   Scene number 2 You can hear your heart pounding.  
  16. You Instantly call Billy (the company IT manager), and ask him firmly, to reach your office immediately. Billy enters your office. You ask Billy to close the door behind him.  
  17. You inform Billy about the "mess," waving your finger in his face. You inform Billy that you need instant answers and that someone will have to pay the price!
  18. Scene number 3   Billy rushes into his office, finds Bob (the Help desk manager), and informs him about the "issue."
  19. Billy asks from Bob to immediately call the IT company, which planned and built our mail infrastructure, and inform them that they will have to provide an accurate answer to the following questions: 1. How did the hostile element manage to hack our system despite the advanced security infrastructure that was supposed to protect our mail infrastructure? 2. How to identify with certainty the hostile element, and locate the hostile element which carried out the attack? 3. How are they going to compensate us for the Indignities and the financial losses?
  20. Scene number 4 Bob calls the technical support of the IT company that built our mail infrastructure. Bob informs them about the incident that happened, and present the list of questions.
  21. The "other side", explains that this problem is not related to "their side" in any way, and that the responsibility for protecting the organization mail infrastructure from such attack, is the responsibility of the organization that owns the mail infrastructure meaning, our responsibility.
  22. After an exchange of harsh words, Bob disconnects the call and informs Billy that the provider refuses to help us and in addition, blames us for the "mess".  
  23. Scene number 5 Billy (the company IT manager) picks up the phone, and calls the technical support of the provider who built the mail infrastructure.
  24. Billy asks politely but firmly to talk to Stephen, the manager! Stephen explains that this problem is not related to "their side" in any way, and that responsibility for protecting the organization mail infrastructure from such attack, is the responsibility of the organization who owns and manages the mail infrastructure.
  25. After an exchange of harsh words, Billy disconnects the call.
  26. Scene number 6 Billy calls you (just a quick reminder; you are Jeff the company CIO) and reports on the conversation with Stephen. The bottom line – Stephen that represents the IT company that built our mail infrastructure declares that – they are not willing to take any kind of responsibility for this mess!  
  27. You ordered Billy to immediately summon a conference call, that includes yourself, Billy (the company IT manager) and Stephen.
  28. You start the phone conversation with some statement about the fact that you have decades of experience in the field (usually, the magic number is 15 years).  
  29. You continue to the "threats phase", and clarify unambiguously that if he (the provider) will not take responsibility, provide immediate answers and solve the mess, you will fire him, sue him, and in addition, publish negative information about his company on Facebook.
  30. Stephen says that he is very sorry, that he understands my pain, but nothing he can do to help us in this scenario.
  31. Scene number 7   Clumping you enter the director's office.
  32. You start to stutter and mumble about security risks, cyber-attacks, the difficulty in dealing with the risks and threats of the modern work environment. Brad (your CEO) informs you that you will have drawn the required conclusions.  
  33. Scene number 8 Two years passed since you have been fired following the unfortunate incident. You could not find another job (because of age and other reasons). Your financial situation is not good, and you get a call from the bank on a daily basis. After many reflections and obsessive thoughts, you decide that….
  34. Scene number 9 The wind blows in your face. You're standing on a high bridge looking into the abyss which pours down!   Good-bye crawl word!