Systems up or down

 

Email Security: Impersonation Protect

Instant and comprehensive protection from the latest malware-less social engineering-based email attacks, often called CEO fraud, impersonation, whaling or business email compromise.

Not all email based attacks use malicious URLs or attachments. Business email compromise attacks are designed to trick key users, often in finance, into making wire transfers or other financial transactions to cyber-criminals by pretending to be the CEO or CFO or Vice Chancellor. Some also target those responsible for sensitive employee data, for example payroll information, which could be used for identity theft.

Targeted Threat Protection with Impersonation Protect detects and prevents these types of attacks. Impersonation Protect identifies combinations of key indicators in an email to determine if the content is suspicious, even in the absence of a malicious URL or attachment.


Video: 48 Seconds

How it works

  • As email passes through the Mimecast Secure Email Gateway, Impersonation Protect examines several key aspects of the message.
  • Impersonation Protect examines the email’s display name, domain name, recent emails received from that domain, reply-to information and the body of the message to determine if the email could be an impersonation attack.
  • If the email fails a combination of these tests, administrators can configure Impersonation Protect to discard the message, quarantine it, or warn the receiver that the email is suspicious.

Further Assistance

If you require further information or assistance, please contact the IT Help Desk on (08) 830 25000 or 1300 558 654.