Technology Record - Issue 32: Spring 2024

141 INTERVIEW Header... aped et officat ature Text text Standfirst... 2 lines before, 2 lines after... ut ra corum, simi, ommoluptatis di vent que suntinverest et molenis alibus abo. Itae nulpa con plabo officaborest BY AUTHORS NAME (1 LINE BEFORE, 2 LINES AFTER) “ PQ...” PUBLIC SECTOR Aalborg Municipality is protecting 17,000 employees against security threats with Check Point Harmony Email & Collaboration capabilities continuously scan inbound emails using contextual analysis, anomaly detection and anti-phishing algorithms to detect BEC and employee impersonation. Harmony Email then creates custom threat profiles by learning communication patterns, relationships and historical emails within users’ inboxes. “Users embraced Harmony and found it easy to use,” says Ellersgaard. “Now they’re notified of a suspicious email and can decide whether or not to release it. They have better awareness of email security because they are involved in the decision process.” Before Harmony, the support team had little visibility into threats while having to make decisions about which emails to release. Now the team now can see the types of emails coming in and is highly aware of the current cyber threat landscape. “Harmony requires minimal effort from our support team,” says Ellersgaard. “We’ve gone from 20 to 25 release requests per day from users to one or two. When we do see a request, our team can quickly discern harmless emails from real threats.” Users are also more aware of the types of sensitive data citizens send in emails to the municipality and have begun helping them to understand the risks and suggesting safer ways of sharing this information. Photo: Unsplash/Absent Wall