We think of cyber criminals as sitting in basements, plotting to subvert technology by breaking through the firewall, but the reality is that the problem is a human one. Technology is actually quite effective at withstanding attacks, so the attackers target the most vulnerable spot – the user.
Proofpoint’s State of the Phish Report Reveals Ransomware and Phishing Attack Trends; Underscores Need for Tailored Security Awareness Training, Particularly for Remote Workers.
Ryan Witt details the factors that make the healthcare sector an attractive target for cybercriminals and how we can counter them.
In 2020, organisations were challenged to accommodate mass remote workforces, while stopping pandemic-related threats and maintaining business continuity. As security teams plan for 2021, their strategies have to evolve in a shifting threat landscape. Below are our top security trends and predictions for the year ahead.
Emile Abou Saleh, Regional Director, Middle East and Africa, Proofpoint, explains how one of the most critical forms of BEC attacks – payroll diversion – works and how security teams can better protect the organisation and, consequently, its people.
Emile Abou Saleh, Regional Director, Middle East and Africa, Proofpoint, discusses why a people-centric security is vital as organizations embrace the cloud amid the new normal.
Proofpoint has announced a new Proofpoint Essentials Security Awareness solution to help small and medium sized businesses (SMBs) identify top …
Majority (82 percent) of CSOs and CISOs have reported at least one cyber-attack on their organisation in 2019, according to the latest research by Proofpoint.
As the defence against insider threats is broad, layered and varied, so too are the costs involved, says Emile Abou Saleh, Regional Director, Middle East and Africa, Proofpoint.
Threat actors are using the names and brands of these video conferencing companies as themes in their social engineering lures, which lead to the theft of various account credentials, malware distribution, or credential harvesting for these spoofed video conferencing accounts.