![]() ![]() Excel documents, Custom EXE, Windows Directories e.t.c. Some of the assets that can be protected using canary tokens include: Whenever an asset protected by a canary token is accessed, an email notification is sent back to the email provided. Canary tokens can be used on production systems and unlike setting up honeypots, they do not require much resources to set up. Canary tokens are just like web bugs (The transparent images added on an email to enable a user to know when the email is opened for example, when running a phishing campaign and we need to know who opened the email and who clicked on the link). Note : If you send Benign alerts, Red Canary will automatically mark them as “not a threat”.Canary tokens are a free and easy way of protecting assets such as emails, websites, and documents from unauthorized access. We recommend selecting Malware, Grayware, and Phishing as these are the most useful alerts to Red Canary.
0 Comments
Leave a Reply. |