EBOOK | Cybersecurity in the modern era
3
INTRODUCTION
If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and
other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume
of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off
human weaknesses:
1
A distracted user who clicks
on a link or opens an email
attachment without thinking
Introduction
2
Step 1: DEPLOY A LAYERED
EMAIL DEFENCE
An employee who falls victim to
an email believed to come from
a company executive, with a
seemingly reasonable request
to transfer money
STEP 2: GET VISIBILITY INTO
CHANNELS YOU DON’T OWN
3
A customer eager to
take advantage of an
online discount
STEP 3: STAY OUT OF
USERS’ WAY
NEXT STEPS
EBOOK | Cybersecurity in the modern era
4
People, not technological weaknesses or vulnerabilities, are at the centre of
most attacks. Firewalls, intrusion detection and prevention systems (IDS/IPS),
network defences, endpoint antivirus software and the like are all important.
But none of them address today’s real security issue: people. It’s time to turn
the focus to humans, the principal risk factor.
Some 90% of targetted attacks start with email. These are generally phishing
attacks: the email purports to come from a reputable person or company and
its apparent validity persuades the recipient to disclose personal information
such as passwords or credit card numbers. Most email attacks require the victim
to take some sort of action: open an attachment, allow a macro to run, click a
malicious link or respond to a fraudulent request to transfer money.
Because today’s attacks are aimed at people, defences need to focus on
protecting people, educating them and doing everything possible to ensure they
are not tricked, exploited or compromised. How can companies put people at
the heart of cybersecurity?
Here are tips on how to choose tools and solutions to improve behaviours
and outcomes.
Introduction
Step 1: DEPLOY A LAYERED
EMAIL DEFENCE
STEP 2: GET VISIBILITY INTO
CHANNELS YOU DON’T OWN
STEP 3: STAY OUT OF
USERS’ WAY
NEXT STEPS
Please complete the form to gain access to this content