Cybercriminals have shifted their focus from infrastructure to people. Last year, less than 1 percent of attacks made use of system vulnerabilities (Proofpoint 2019) and instead targeted individuals, exploiting human instincts of curiosity and trust.
While a breach attempt can take on many forms: from email and web to cloud applications and social media, it is the impact of social engineering that can persuade victims to click malicious links, download unsafe files or disclose sensitive information. No matter how well you’re managing your IT infrastructure, you can’t patch your way out of these people-centred attacks.
IT and security leaders have been engrossed in their transformation projects, especially now that more users are working from home. Where enterprise data, information and workflows were always distributed, and where services and applications are being moved to the cloud, the new working landscape presents a whole new level of security risk, yet also a great opportunity to bolster protection.
Join Proofpoint and your cybersecurity peers to discuss how to safeguard your data, make your users more resilient to cyber attacks and reduce compliance risks across email, the cloud, social media, and the web.