People centric: Protecting the human weaknesses

    Most organizational information security efforts today are directed towards peripheral protection. 61% of the total expenses invested by information security professionals are in communication and about 20% in End Point, leaving a very small remaining investment in protecting the activities of end users. Proofpoint decided that the time has come to change the traditional peripheral approach in favor of a human-based protection. This decision relies primarily on a single troubling fact: About 96% of the attacks on organizations today target the human factor and their success is a result of users “cooperation”.
    It is difficult to remain indifferent to the above fact, which points to a simple conclusion: due to recent and ongoing improvements of information security products, Cyber Criminals no longer search for technological weak points. Rather, they search for “the next human error”, which is just around the corner.
    Attackers’ Social Engineering technologies have become well-known in the Cyber world, due mainly to the vast information to be found in social networks. Today it is very easy to identify the people filling key positions in the organization, and the path to reach them has become simpler than ever before. Attackers mark “human goals” and study them well (hobbies, personal pastimes, etc.), so that the bait becomes much easier to set and much more believable.
    As attackers are well aware, many of the key personnel in the organization (VIP – Very Important People) lack the required tools for coping with attack situations. Through the VIP the attacker may succeed in entering the organization’s most classified areas. In addition, Proofpoint has coined the term VAP (Very Attacked People), meaning employees who are highly sought after as attack targets, although they are not VIP. These may include the CEO’s secretary, who holds many permissions and attacking her may bring substantial benefit to the attacker.
    This is why Proofpoint has decided that the best protection should center on the human factor. Proofpoint provides extensive information as to the breakdown of attacks made against the organization (which in over 90% of cases occur through email), enabling information security managers to pinpoint the most attacked targets and protect them more rigidly and even provide them with the tools and knowledge needed for coping with such situations.
    In our upcoming lecture, Ben Kapuler, Sales Israel at Proofpoint, will share this unique approach, review the various products and describe the huge benefits of looking at the human factor, which today has become central.

    PREVIOUS Story Next Story

    The latest news about us

    NGWF VM-Series: The Next-Generation Virtual Firewall Solution
    נובמבר 29, 2023
    Palo Alto Cortex XSIAM
    נובמבר 29, 2023
    Palo Alto Bolsters Cybersecurity Dominance with Talon’s Acquisition
    נובמבר 9, 2023
    Higher Trust: What’s the meaning of transition from ZTNA 1.0 to ZTNA 2.0
    נובמבר 2, 2023
    Enhancing Incident Response and Data Security with Rubrik Security Cloud
    ספטמבר 27, 2023
    Rubrik Rubrik Acquires Laminar: Setting the New Benchmark for Cyber Resilience
    אוגוסט 20, 2023
    Rubrik Backup & Recovery for Microsoft 365
    אוגוסט 6, 2023
    Rubrik Business Continuity Plan
    יולי 27, 2023
    Amplifying Kubernetes Power: 10 Usage Scenarios
    מאי 23, 2023
    Rubrik Leading the trend: Merging Backup and Security
    יוני 26, 2023
    Proofpoint Innocom Set to Deliver Identity Theft Protection Following Proofpoint's Latest Acquisition
    אפריל 23, 2023
    Rubrik Beyond Traditional: Safeguard your backups against sophisticated attackers
    אפריל 20, 2023
    Rubrik Rubrik Data Protection for Microsoft O365
    אוקטובר 5, 2021
    Juniper Networks Juniper Networks- Welcome to Innocom Family!
    יולי 20, 2021
    Citrix How to secure a Source Code?
    ספטמבר 9, 2020
    Rubrik The Beauty of Immutability
    ספטמבר 9, 2020
    Citrix Innocom Won Distributor of the Year 2020!
    ינואר 25, 2021
    Proofpoint Proofpoint Essentials Threat Protection Bundle for SMB's
    יוני 3, 2021
    Palo Alto Safe and secure remote operation is one of the most important challenges for businesses today
    ספטמבר 9, 2020

    תפריט נגישות