It obvious that for businesses to work they will be constantly exchanging email with clients, suppliers and internally and that many of these emails will contain important attachments. If we recognise this then so do the bad actors and they will exploit this business function if they can. Some attachments …
Continue reading “Attachments are a favourite attack vector”