The greatest asset and greatest risk in your organization are one and the same: people.
Cybercriminals understand this. That’s why they exploit human vulnerabilities more than any other type of network weak point.
In this episode, Keri chats with Casey Borresen,
Channel Sales Engineer, Proofpoint
and Jacob White,
Tech Consultant, Ingram Micro. The trio discusses:
"Just when you think things are getting boring, attackers come up with new, exciting, and—quite frankly—horrifying ways to make sure I'm always employable." — Casey Borresen
- How a people-centric security strategy works
- Why effective email security is so vital in today’s business world
- How to implement the best security policies and controls within your organization
- Why cybercriminals are now focusing more on business verticals than specific platforms
Ain’t no rest for the wicked. No rest for those of us who defend against the wicked either.
Fortunately, Proofpoint helps partners implement people-centric security solutions against cybercriminals who are getting sneakier every day.
Attacks focus on people
Casey discloses that cyberattacks now almost entirely focus on users. Why? Because people make mistakes.
It’s easier for attackers to gain access to a private network through one user’s vulnerabilities than it is to infiltrate a security system.
The main way cybercriminals gain access to people working in your organization? Email.
Both Casey and Jacob emphasize the importance of a good email security system. Phishing is the #1 way bad actors gain credentials from network users.
Security features that protect against advanced threats that come in the form of attachments and URLs should be top of mind. One click and a criminal can be set loose within your private network.
Incentivize your organization
It’s true: Good information security habits start at the top. But, even leadership sometimes needs incentivizing to take this stuff seriously.
Jacob urges IT pros to focus on what you can control. Try calling on HR to help you implement security policies within your organization.
For what you can’t control, deploy a smart security solution that flags suspicious emails.
For more on information security best practices, check out Proofpoint’s website or email Jacob at firstname.lastname@example.org
To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website.