After detecting an account as compromised, emails previously sent from this account are scanned and - if needed - removed from users’ mailboxes. Compromised accounts can cause a lot of damage, and fast. In addition to automatically blocking the account, SOC teams also need to investigate the activity of the account after it was compromised. To […]