Cyberattackers target people. They exploit people. Ultimately, they are people. That’s why the Human Factor report focuses on how technology and psychology combine to make people so susceptible to modern cyberthreats. In this first volume, we take a closer look at attacks that rely on social engineering, including business email compromise (BEC) threats, email fraud and phishing.
Data loss is a people problem Zero-day attacks and unpatched vulnerabilities make a lot of headlines. But the results of our inaugural 2024 Data Loss Landscape report show that people are the root cause of most data loss incidents.
Find out how vulnerable your users are to today’s biggest cyber threats in the 2024 State of the Phish report. Learn phishing trends, key insights, statistics, and more.
Cybers
Illuminating identity risks that leave every organisation vulnerable to attack Analysing Identity Risks (AIR) 2022 is a statistical analysis of every Identity Risk Assessment that Illusive conducted during 2021 and includes real-world examples of how these identity risks manifest.
Identity is the top attack vector for healthcare providers. Cyber criminals have learned sophisticated ways to steal user credentials. And tools like single sign-on and multifactor authentication often can’t stop them from gaining access to sensitive data.
The cyber threat landscape in the Middle East is rapidly evolving, with cybercriminals increasingly targeting people rather than infrastructure.
Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care Healthcare IT and security professionals have spoken. Ponemon listened.
Cyber criminals are getting bolder and more sophisticated with their threats.
In our latest social engineering report, Proofpoint researchers analyse key trends and behaviours in
Phishing doesn’t get the attention it deserves. Attackers use it—and other tactics—to steal credentials, spread malware and commit fraud. But you can protect against email-borne threats with Forrester’s layered approach.
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed close behind. This cloud account compromise threat brief will help you understand: