The Human Factor 2015
End users and malicious emails
Get an Alertwhen The Register has something new about ...
Check the boxes & select Email or Atom/RSS Feed.
Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. This report has been developed to explore this aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments, tracking threats in email attachments, social media posts, and URLs.
This paper uses original field research to provide insight on who is clicking, and what they are clicking on, as well as when, where, and why they are clicking - because as the data show, the weakest link in security is all of us.
You will have to register, or log in, in order to download this content.