Federal cybersecurity teams are under intense scrutiny as public sector breaches dominate headlines. Unfortunately, another critical threat is looming.
Sunday is the big game and fans across the U.S. are getting ready. In preparation, our expert social media research team examined the official Facebook pages for the 12 playoff teams between January 7-27, 2016.
Last Friday, January 22, our worldwide threat intelligence system detected the largest sustained Dridex campaign on record—66 percent greater than the previous high.
It’s been clear for a long time that attackers will leverage any means necessary to infiltrate a targeted organization.
In the five years since its inception, Instagram has rapidly increased in popularity, joining Facebook, YouTube, and Twitter as one of the top social media sites on the web.
Hackers, spammers and scam artists see social media as an opportunity to easily distribute their wares to massive audiences. We see it all the time in association with large brands. A single phishing or scam lure posted to a big brand can reach ten thousand potential victims.
As a Proofpoint customer, your satisfaction is our top priority. We strive to continuously improve our service offerings and are excited to share that we will be migrating to a new support portal in 2016! This new service will allow for a smarter, more personalized customer experience.
Chances are, you are considering Microsoft Office 365 as part of your archiving strategy. Today, practically every IT team is asking themselves:
“Is it good enough?”
“How does it work?” and
“How does it compare with third party solutions?”
Next week is Black Friday, followed shortly by Cyber Monday—and ‘tis the season for cybercriminals to take advantage of online shoppers. Below are four tips from Proofpoint cybersecurity experts on how to stay cyber safe this season:
Developing a modern enterprise archiving strategy isn’t easy. IT departments are increasingly plagued by data growth and service requirements back to internal customers. Legal and compliance teams struggle with how to best retain, access, discover and ultimately dispose of content in complianc