proofpoint.com2024StateofthePhishRiskyactions,real-worldthreatsanduserresilienceinanageofhuman-centriccybersecurityREPORTINTRODUCTIONImagineasuccessfulcyberattackagainstyourorganization.Whatdoesitlooklike?Maybeitinvolvesafiendishlycleverpieceofsocialengineering—aconvincinglurethatcatchestherecipientoffguard.Ormaybeitwouldtakeasmarttechnicalexploittogetpastyourdefenses.Butinreality,threatactorsdon’talwayshavetotrythathard.Often,theeasiestwaytobreachsecurityistoexploitthehumanfactor.Peopleareakeypartofanygooddefense,buttheycanalsobethemostvulnerable.Theymaymakemistakes,fallforscamsorsimplyignoresecuritybestpractices.Accordingtothisyear’sStateofthePhishsurvey,71%ofworkingadultsadmittedtotakingariskyaction,suchasreusingorsharingapassword,clickingonlinksfromunknownsenders,orgivingcredentialstoanuntrustworthysource.And96%ofthemdidsoknowingthattheyweretakingarisk.Whenobligedtochoosebetweenconvenienceandsecurity,userspicktheformeralmosteverytime.So,whatcanorganizationsdotochangethis?Inthisreportwe’lltakeacloserlookathowattitudestowardssecuritymanifestinreal-worldbehavior,andhowthreatactorsarefindingnewwaystotakeadvantageofourpreferenceforspeedandexpedience.We’llalsoexaminethecurrentstateofsecurityawarenessinitiatives,aswellasbenchmarkingtheresilienceofpeopleandorganizationsagainstattack.Thefoundationofthisreport...
发表评论取消回复