Case Studies
CSC Generation's Deployment of Abnormal Security to Combat BEC Attacks
Overview
Cybersecurity & Privacy - Application Security Cybersecurity & Privacy - Identity & Authentication Management Cybersecurity & Privacy - Security Compliance | |
Retail | |
Business Operation Procurement | |
Cybersecurity Fraud Detection Remote Control | |
Cybersecurity Services System Integration | |
Operational Impact
Immediately upon integrating, Abnormal Security began identifying and blocking various BEC attacks: from executive impersonation attacks to invoice fraud attempts from established vendors. | |
Abnormal Security also began to provide real-time detection of user accounts that were compromised. This includes the ability to identify incidents where compromised passwords were used to successfully authenticate, but failed MFA. | |
These detections and automated remediations provided significant time savings for the security team from lengthy manual response processes. | |
Quantitative Benefit
Abnormal Security represents more than half of all cyberthreat related financial losses according to the 2019 FBI Internet Crime Complaint Center (IC3) report. | |