Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization taking a people-centric approach to phishing prevention?
The sixth annual State of the Phish again delivers critical, actionable insights into the current state of the phishing threat, including:
• The end-user awareness and knowledge gaps that could be negatively impacting your cybersecurity defenses
• The impacts InfoSec professionals are experiencing as a result of phishing attacks, and the ways they're attempting to combat these threats
• How organizations are delivering phishing awareness training, and the ways they measure program success
Die größte Cyberbedrohung geht heutzutage nicht von Zero-Day-Schwachstellen, neuer Malware oder aktuellen Exploit-Kits aus, sondern von den Anwendern in Ihrem Unternehmen. Heutige Angriffe zielen auf die menschliche Schwachstelle ab, nicht auf...
Zur Abwehr von Business Email Compromise (BEC, auch als Chefmasche bekannt) und Email Account Compromise (EAC, auch als E-Mail-Kontoübernahme bekannt) sind mehrstufige Schutzmaßnahmen erforderlich. Cyberangreifer versuchen mit immer neuen Methoden...
Ihre Cybersicherheit ist insgesamt nur so stark wie ihr schwächstes Glied. Da die schwerwiegendsten Bedrohungen heute auf personenorientierte Taktiken setzen, sind Ihre Anwender nicht nur Ihr wertvollstes Kapital, sondern auch Ihr größtes...
Das Ponemon Institute stellt die Erkenntnisse aus der weltweiten Untersuchung zu den Kosten von Bedrohungen durch Insider vor. Die von ObserveIT und IBM unterstützte Untersuchung ist die dritte Benchmark-Untersuchung dieser Art und liefert...
Bedrohungen durch Insider nehmen zu. Dies geht aus dem globalen Ponemon-Bericht für das Jahr 2020 zu den Kosten von Insider-Bedrohungen hervor, der seit 2018 einen Anstieg der durch Insider verursachten Cybersicherheitszwischenfälle um 47 %...
Die Bedrohungen haben sich geändert. Mittels Social Engineering verleiten Cyberkriminelle Anwender in Unternehmen dazu, auf unsichere Links zu klicken, Anmeldedaten einzugeben oder gar unwissentlich bei der Umsetzung der Angriffe mitzuhelfen (z. B....
There’s no question that organisations (and individuals) faced many challenges in 2020, both new and familiar. Information security teams felt the strain, too. On top of “ordinary” cybersecurity issues, professionals in these roles dealt with...
This whitepaper focuses on how Sweden is gaining continuous threats from cyber criminals. Email based threats, phishing and ransonware attacks are completed through social engineering techniques. Workforces must make proactive changes and educate...
No matter how well you’re managing your IT infrastructure, you can’t patch your way out of people-centered attacks. Your cybersecurity posture is only as strong as its weakest link. And in today’s people-centric threat landscape, that means...
Email is organisations’ most essential business tool—and today’s top malware delivery vector. However, cyber attackers can trick users into clicking on an unsafe link, giving away their credentials, or wiring money or sending sensitive files....
Having the skills to identify and avoid lures in email phishing attacks is critical. But so is understanding how your behaviour, even beyond your inbox, can affect security. Is it time you brushed up on best practice cyber hygiene, security and...
3 PROTECTING THE END USER | A People-Centric Approach to Managing Vulnerability, Attacks and Privilege WHY PROTECTION STARTS WITH PEOPLE It’s clear that the usual defend-the-perimeter model of cybersecurity isn’t working—and hasn’t worked...
STATE OF THE PHISH | 2019 3 THREE PILLARS OF CONTENT Security Awareness Training: Outcomes and Opportunities We close this year’s report with an in-depth look at the data gleaned from FOR THIS YEAR’S REPORT, WE FOCUS ON THREE KEY AREAS OF DATA...
Do your personal cyber security habits carry over into work hours? If so, did you know that you're making it easier for cyber criminals to exploit your mistakes, inducing things like ransomware infections and credential compromise threats? These...
EBOOK | Cybersecurity in the modern era 3 INTRODUCTION If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email...
Email-based phishing attacks are a serious threat to organisations worldwide. Anti-phishing training should be the foundation of any security awareness training programme, but it’s critical to think beyond email (in more ways than one) to...
3 The Human Factor | 2017 Table of Contents Key Findings .............................................................................................................................................................................4 By the...
Executive Summary So your organisation has decided to migrate to Microsoft Office 365. While you’ll likely benefit from its cloud collaboration capabilities, you might want to ask more about what Office 365 means for security, compliance and...
Introduction After years of negotiations, the European Union General Data Protection Regulation (EU GDPR) will come into effect on 25 May 2018, replacing the 22-year-old EU Data Protection Directive. At its core, the GDPR aims to put EU residents in...