Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues

By Steven Davidson
March 01, 2018

 

Established in 1981, Mesa Systems, Inc. is a full-service provider of residential, commercial, and logistics-based mobility solutions for businesses and individuals. We have helped many of the world's largest, most respected corporations move their employees, offices, and industrial facilities domestically and internationally.

As Director of IT, it is my responsibility to support over 150 transportation management specialists and relocation customer care professionals across multiple locations in the U.S. In my years of experience, I've come to understand that phishing is a constantly changing landscape, which requires my unwavering attention and focus.

Pain Point

We have noticed that email attacks come in waves; we receive approximately 10 phishing emails each week. Every company gets spam and other unsophisticated phishing attacks, which are obviously malicious (e.g., bad grammar, etc.). These are easy to detect and avoid for most employees. The challenge lies in the less obvious, difficult to detect and clever messages that can easily escape the untrained eye. This, coupled with a link or attachment directing them to take the wrong action, can cause catastrophe. Because I know the potential risk to the company if an employee were to take the bait, I treat each phishing email seriously.

The Problem

Initially, we rolled out a security awareness and training program that required me to customize content and take the necessary time and effort to monitor and train the employees — to teach everyone how to spot emails that might not be legit and report them. While the training increased overall awareness and guided more cautious behavior — which is a good thing — it also created additional work for me. Even with extensive training of my employees, I was still getting an exorbitant amount of questions such as, “Can I open this? What about this? How about this?” Investigating possible phishing emails has been a manual process, which required us to look into each email, verify if it was legitimate and then reply back to the employee with the outcome and instructions.

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.

Removing Restrictive Covenants In New York Image

In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?