Protecting Your Health System from Imposter-Based Emails

Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals - based on their roles and likely access - and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con.

Fill out the form to watch the webinar replay now.