DentalPC Exchange Online Protection
The advanced threats of 2015 generally spread by one of two main vectors: as email attachments, or dropped by exploit kits on users visiting sites with infected ad streams. Like any business, most cybercriminal operations follow the money, looking for the easiest way to steal something of value, and getting thru standard email is easy, real easy.