
Enhanced Security for Actions taken by End Users

ByCheck Point Team
End users are required to authenticate before taking actions from email notifications
With the rising threats Check Point detects in the wild, applications now need additional measures to ensure unwanted actions aren’t taken on behalf of your end users.
As part of this trend, end users will be required to authenticate when they click on links that trigger actions on their behalf (e.g., restoring an email from quarantine).
They will be required to enter their email address and type in a one time passcode that will be sent to their mailbox.
This process will need to be done only once every 30 days.
In the near future, administrators will be able to extend or shorten the duration for which a single authentication will be valid for.
You may also like
How hunting for vulnerable drivers unraveled a widespread attack
Attackers are increasingly targeting vulnerabilities in drivers, which operate in ...
Cyber Criminals Using URL Tricks to Deceive Users
Overview: In a newly observed scam, Check Point researchers found ...
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in ...
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new ...