It was the midnight hours of a Tuesday morning when Tracy Kelpman, the lead engineer for a large tech company, was jolted awake by a notification on her phone.
Groggily, she unlocked her screen to see what the commotion was about and her heart sank as she saw the message: "Zoom Security Incident."
She immediately sprang into action, logging into the company's security dashboard to see what was happening. Her team had been monitoring a few suspicious accounts in zoom, and they had finally been caught in the act.
The accounts were using phishing techniques to try and steal sensitive information from the company's employees. They were successful in a few cases, but Tracy and her team were able to quickly shut down the attacks and secure the affected accounts.
Tracy quickly mobilized her team and began a root cause analysis using ThreatKey. They were able to quickly identify the source of the attacks and implemented new security measures to prevent such an incident from happening again.
One of the most important changes was the addition of two-factor authentication for all employee accounts and enforcing login via their SSO provider.