Attacks using an organisation’s mail streams may be intended to cause physical damage, harm to individuals, to create fear or to cause disruption.
This session covers:
- Suspicious indicators for an item of mail
- The actions to take on discovery of a suspicious item of mail
- The Remove, Remove, Remove protocol
- Considerations for Contingency planning