Mediterranean Restaurant Group Serves Up Security with Abnormal

March 10, 2022

At Abnormal Security, we empower our customers through technology to design incredible fashion, protect mortgages and their clients' wealth, keep entertainment running, care for their patients, provide for student learning and so much more. By stopping the email attacks that bypass other security infrastructure, Abnormal provides the protection organizations need to focus on their business. And for one of our customers, that business is serving Mediterranean-inspired cuisine across 80 restaurants in over a dozen states.

To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks. He recently sat down with Abnormal CISO Mike Britton to talk about his experience as an Abnormal customer. While the full video is included here, some highlights are included below.

Cava video modal

Deciding Against the Secure Email Gateway For an Improved Efficacy Solution

Much like the rest of the world, this restaurant group was impacted by the pandemic in 2020 when all security was forced to become cloud-based seemingly overnight. And because the organization was small, whaling was a major issue for the company, where executives were seeing a lot of noise. The organization relied on Exchange Online Protection for their Microsoft 365 environment, but these attacks slipped by their current system.

The cybersecurity team first looked at traditional secure email gateways, having had experience implementing them for companies in the past. But when the Director of Cybersecurity started to evaluate them, he realized there might be a better way. He stated, “I asked myself and my team, is a secure email gateway the right architecture to be protecting our email? Do we want another appliance in the path of SMTP? And if the answer is yes, then what in that approach differentiates itself or is still highly relevant today? And we came away from that process feeling like secure email gateways were a little long in the tooth.”

Visionary Director Identifies New Approach to Solve Needs

Enter Abnormal. The team knew that an API-based approach to email security would be cheaper than a legacy SEG, but the real differentiator needed to be a meaningful improvement in efficacy. The director stated, “The architecture and modernness of the solution, the efficacy, and the ROI cost-effectiveness were the three key areas we were evaluating at the time.” While the organization reviewed multiple vendors, they wanted to understand exactly how each performed in their environment.

In order to do see what that efficacy looked like in practice, the organization completed a risk assessment with Abnormal. “Ultimately the architecture mattered a lot. It took less than 30 minutes to set up but the key was that there’s no extra point of failure. The simplicity of Abnormal’s approach was a big draw for us.” And because of the API, there was no need to change mail routing, meaning there was no extra point of failure. Once integrated, Abnormal could detect the email threats sitting in the organization’s environment to determine what was being missed by Microsoft.

Promoting a Defense-in-Depth Solution

As part of the conversation with Britton, the director spoke about a layered email security solution, acknowledging that while Abnormal is not expected to stop 100% of all attacks, it is a vital layer in a defense-in-depth solution. He stated, “And so, do I believe Abnormal is going to catch a hundred percent of all malicious email… I don’t. But that’s also why we have other solutions. There is no silver bullet but defense-in-depth is the best way to approach it, and Abnormal catches attacks much better than others on the market.”

Because the team believes strongly that more layers are important, he adds security awareness training to his email stack, underscoring the importance of the human element. In a recent phishing campaign, employees clicked on phishing emails about 14.5% of the time, which benchmarks very closely to the industry. But by combining this information with what is available in the Abnormal dashboards, the team can understand who is being targeted and fine-tune policies for those most at risk.

With a combination of email security tools, including Microsoft and Abnormal, the cybersecurity team ensures that employees within the restaurant group are protected from the attacks that attempt to trick them into submitting fake invoices or changing payroll details for employees. As a result of the security practices implemented, this restaurant remains protected—and can subsequently focus on providing the best Mediterranean cuisine to customers across the United States

To learn more about the features this organization uses to protect employees and how you can use them too, request a demo of the Abnormal platform today.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More
B Overhauled Architecture Blog 08 29 22
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Read More
B Winning Back Productivity
Limiting time-wasting email messages makes employees more productive. Here’s how innovative organizations are addressing the challenge.
Read More
B Account Takeover Blog 08 22 22
Learn how threat actors execute account takeovers, how they exploit compromised accounts, and what you can do to reduce your risk.
Read More