Cybersecurity for the modern era

EBOOK | Cybersecurity in the modern era 3 INTRODUCTION If you’re like most IT leaders, you’re invested heavily in the latest security tools. Yet you’re still inundated with ransomware and other advanced malware, credential phishing, email fraud and more. You’re spending more time dealing with a growing volume of threats. And you’re seeing a shrinking return from your security investments. That’s because most of today’s attacks play off human weaknesses: 1 A distracted user who clicks on a link or opens an email attachment without thinking Introduction 2 Step 1: DEPLOY A LAYERED EMAIL DEFENCE An employee who falls victim to an email believed to come from a company executive, with a seemingly reasonable request to transfer money STEP 2: GET VISIBILITY INTO CHANNELS YOU DON’T OWN 3 A customer eager to take advantage of an online discount STEP 3: STAY OUT OF USERS’ WAY NEXT STEPS EBOOK | Cybersecurity in the modern era 4 People, not technological weaknesses or vulnerabilities, are at the centre of most attacks. Firewalls, intrusion detection and prevention systems (IDS/IPS), network defences, endpoint antivirus software and the like are all important. But none of them address today’s real security issue: people. It’s time to turn the focus to humans, the principal risk factor. Some 90% of targetted attacks start with email. These are generally phishing attacks: the email purports to come from a reputable person or company and its apparent validity persuades the recipient to disclose personal information such as passwords or credit card numbers. Most email attacks require the victim to take some sort of action: open an attachment, allow a macro to run, click a malicious link or respond to a fraudulent request to transfer money. Because today’s attacks are aimed at people, defences need to focus on protecting people, educating them and doing everything possible to ensure they are not tricked, exploited or compromised. How can companies put people at the heart of cybersecurity? Here are tips on how to choose tools and solutions to improve behaviours and outcomes. Introduction Step 1: DEPLOY A LAYERED EMAIL DEFENCE STEP 2: GET VISIBILITY INTO CHANNELS YOU DON’T OWN STEP 3: STAY OUT OF USERS’ WAY NEXT STEPS
Please complete the form to gain access to this content