Scott Laliberte, Protiviti Managing Director, Technology Consulting
As organizations look for workable ways to accommodate an increasingly mobile work force with remote access to email via internet and personal devices, hackers are using weaknesses in two of the most common email programs to breach internal networks. Once a hacker has gained access to a valid email account, it is easy to send and execute malware that creates a back door from the communications server to the corporate network. Organizations should immediately review their Exchange and email configuration to determine whether they are vulnerable to this issue. This article lists a few strategies organizations may need to implement in order to address this growing threat.