In Adenike Cosgroves blog, she explores the top three vectors identified by Verizon in their 2020 Data Breach Investigations Report (DBIR) comprehensive analysis and offers some suggestions for how to equip your organization to protect against each.
Credential Theft
Stolen credentials were used in over 80% of attacks on web applications and 43% of breaches were attacks on web applications, more than double the results from last year.
Phishing
If stolen credentials is the top prize for cybercriminals, phishing is the preferred method to achieve it. Spoofing a trusted identity, phishing attacks exploit human nature rather than exclusively technological vulnerabilities.
Human Error
Human error accounted for 22% of all data breaches in Verizon’s report. Insiders have always been a challenge to the confidentiality and integrity of available data.
There are five key pillars to a people-centric cybersecurity strategy to help protect your workforce:
Secure personal activities on corporate devices
Implement an adaptive, risk-based solution that meets your organization’s security needs without getting in the users’ way
Protect the email channel
End-to-end email security is crucial to detecting, combatting and remediating phishing attacks across your organization.
Mitigate human error
You must be empowered to detect threats, streamline your investigations and protect against data loss.
Secure the Cloud
Protect users as they browse the web and use cloud apps.
Educate Users
Turn your users into a strong last line of defense – regardless of where they work
Read Adenike Cosgrove’s full blog here and contact your local Exclusive Networks Account Manager to learn more about how Proofpoint can help you implement a people-centric cybersecurity strategy to help protect your workforce.