Phishing Detections: Starting the DIR Process
Email phishing and BEC attacks both rely on email communication, so an email security tool is integral to protecting your environment. However, while an email security tool plays a central role in detecting phishing attempts, it’s not the sole solution.
To effectively detect phishing and BEC incidents, it’s important to take a holistic approach, which requires gathering telemetry data from various sources throughout the network and security tool spectrum. The data sources beyond email security solutions include:
- Email Security
- Email Server
- User Behavior Analytics
- Forward Proxy
- Cloud security access brokers (CASBs)
- Network Intrusion Detection
- Endpoint Detection and Response (EDR)
- Business Applications
- Multi-factor Authentication (MFA)
- Threat Intelligence Platforms (TIPs)
- Network Firewalls
- Web Security Gateways