Remove CISO Remove Phishing Remove Social Engineering Remove Webinar
article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Social engineering lures are a good example. This certainly applies to the volume of threats facing cybersecurity teams. Increased File Sharing.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

In our previous two features, we covered the dangers of phishing (one method of credential compromise) and how to mitigate its impact on users. The answer, like most other cybersecurity-adjacent answers, lies in a combination of factors including social engineering , weak passwords, and other risky security moves or attacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEC Attacks: Protecting Against the Most Insidious Cybercrime

SecureWorld News

Ryan Witt, Proofpoint's Managing Director for Healthcare, who joined the SecureWorld webinar Protecting Healthcare from Email Fraud Attacks, also shared the sentiment that BEC attacks have a larger impact than ransomware. Educate and defend against phishing attacks. Ransomware is kind of one of those kitchen table sort of topics.

article thumbnail

Top 8 Cyber Insurance Companies for 2022

eSecurity Planet

Other cyber incidents are common, including phishing attacks , business email compromise, exploitation of cloud and software vulnerabilities , social engineering , third-party exposures, and more. It hosts Cybercrime Spotlight webinars on emerging cyber threats and the most effective controls to prevent them.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.