Proofpoint

Whitepaper

How Proofpoint Defends Against Ransomware

🕧 2 minRansomware is one of today’s most disruptive forms of cyber attack. It puts victims out of business, forces hospitals to turn away patients and brings entire governments to a standstill. It has evolved into one of the most menacing cyber threats today. Last year alone, the United States experienced more than 65,000 ransomware attacks. The…
Whitepaper

Getting Started with DMARC

🕧 2 minThe Domain-based Message Authentication, Reporting and Conformance (DMARC) standard, unveiled by a group of leading email organizations in February 2012, is one of the most powerful and proactive weapons to date in the fight against phishing and spoofing.
Whitepaper

The Human Factor 2023

🕧 2 minThe more things change, the more they stay the same. In some respects, 2022 saw a lot of development in the threat landscape. Attack chains became more varied. Delivery mechanisms were rapidly tested and discarded. And threat actors began to match their ingenuity with new-found patience.
Whitepaper

Cloud in the Crosshairs

🕧 2 minIn the digital era, Microsoft 365 is an essential tool for getting work done. Unfortunately, its popularity has made it a prime target for cyber criminals. And while Microsoft 365 includes a host of native capabilities to stop cyber attacks, these tools are simply no match for today’s sophisticated attacks
Whitepaper

Driving Real Behaviour Change

🕧 2 minThat’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They trick people into opening malicious attachments, clicking unsafe URLs, handing over account credentials and even taking direct action—such as wiring money or sending sensitive data.
Whitepaper

Beyond Awareness Training

🕧 2 minAbout 95% of organisations say they provide phishing awareness training to their users. But30% say they train only portion of their user base.3 It’s no wonder that phishing is still thethreat type most likely to cause a data breach.
Whitepaper

2023 State of the Phish

🕧 2 minEvery year, threat actors look for new ways to outwit victims and bypass defenses. And 2022 was no different. As businesses rolled out new security controls, cyber criminals responded.