chat
expand_more

Mediterranean Restaurant Group Serves Up Security with Abnormal

To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks.
March 10, 2022

At Abnormal Security, we empower our customers through technology to design incredible fashion, protect mortgages and their clients' wealth, keep entertainment running, care for their patients, provide for student learning and so much more. By stopping the email attacks that bypass other security infrastructure, Abnormal provides the protection organizations need to focus on their business. And for one of our customers, that business is serving Mediterranean-inspired cuisine across 80 restaurants in over a dozen states.

To help the restaurant business succeed, the Director of Cybersecurity implemented Abnormal Security to stop spear phishing emails and other advanced attacks. He recently sat down with Abnormal CISO Mike Britton to talk about his experience as an Abnormal customer. While the full video is included here, some highlights are included below.

Deciding Against the Secure Email Gateway For an Improved Efficacy Solution

Much like the rest of the world, this restaurant group was impacted by the pandemic in 2020 when all security was forced to become cloud-based seemingly overnight. And because the organization was small, whaling was a major issue for the company, where executives were seeing a lot of noise. The organization relied on Exchange Online Protection for their Microsoft 365 environment, but these attacks slipped by their current system.

The cybersecurity team first looked at traditional secure email gateways, having had experience implementing them for companies in the past. But when the Director of Cybersecurity started to evaluate them, he realized there might be a better way. He stated, “I asked myself and my team, is a secure email gateway the right architecture to be protecting our email? Do we want another appliance in the path of SMTP? And if the answer is yes, then what in that approach differentiates itself or is still highly relevant today? And we came away from that process feeling like secure email gateways were a little long in the tooth.”

Visionary Director Identifies New Approach to Solve Needs

Enter Abnormal. The team knew that an API-based approach to email security would be cheaper than a legacy SEG, but the real differentiator needed to be a meaningful improvement in efficacy. The director stated, “The architecture and modernness of the solution, the efficacy, and the ROI cost-effectiveness were the three key areas we were evaluating at the time.” While the organization reviewed multiple vendors, they wanted to understand exactly how each performed in their environment.

In order to do see what that efficacy looked like in practice, the organization completed a risk assessment with Abnormal. “Ultimately the architecture mattered a lot. It took less than 30 minutes to set up but the key was that there’s no extra point of failure. The simplicity of Abnormal’s approach was a big draw for us.” And because of the API, there was no need to change mail routing, meaning there was no extra point of failure. Once integrated, Abnormal could detect the email threats sitting in the organization’s environment to determine what was being missed by Microsoft.

Promoting a Defense-in-Depth Solution

As part of the conversation with Britton, the director spoke about a layered email security solution, acknowledging that while Abnormal is not expected to stop 100% of all attacks, it is a vital layer in a defense-in-depth solution. He stated, “And so, do I believe Abnormal is going to catch a hundred percent of all malicious email… I don’t. But that’s also why we have other solutions. There is no silver bullet but defense-in-depth is the best way to approach it, and Abnormal catches attacks much better than others on the market.”

Because the team believes strongly that more layers are important, he adds security awareness training to his email stack, underscoring the importance of the human element. In a recent phishing campaign, employees clicked on phishing emails about 14.5% of the time, which benchmarks very closely to the industry. But by combining this information with what is available in the Abnormal dashboards, the team can understand who is being targeted and fine-tune policies for those most at risk.

With a combination of email security tools, including Microsoft and Abnormal, the cybersecurity team ensures that employees within the restaurant group are protected from the attacks that attempt to trick them into submitting fake invoices or changing payroll details for employees. As a result of the security practices implemented, this restaurant remains protected—and can subsequently focus on providing the best Mediterranean cuisine to customers across the United States

To learn more about the features this organization uses to protect employees and how you can use them too, request a demo of the Abnormal platform today.

Mediterranean Restaurant Group Serves Up Security with Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B Evil Panel Blog
EvilPanel is a new phishing toolkit built on Evilginx that provides a full-featured web interface for launching MFA-bypassing attacks.
Read More
B SAT
Discover why traditional security awareness training isn’t reducing human risk and how AI-driven, personalized training can transform SAT effectiveness in 2025.
Read More
B 1500x1500 Through the Looking Glass RSAC 2026
What did RSAC 2025 reveal about the next wave of cyberthreats—and the AI-powered tools to stop them? Abnormal’s Field CISO shares her top takeaways.
Read More
B 5 8 25 AI Inn
Discover how Abnormal AI accelerates developer velocity with its secure, in-house Model Context Protocol (MCP), integrating tools like GitHub and Jira directly into local environments to streamline workflows without compromising security.
Read More
B SEGROI
Discover the measurable ROI of replacing your SEG with Abnormal—from 91% faster incident response to $703K in productivity savings.
Read More
B 4 24 25 Platform
Tool bloat is an easy win for hackers and a major integration headache for overstretched security teams. Platformisation could be the antidote to cyber complexity, closing the coverage gaps while dramatically easing the management of multiple security tools.
Read More