How to avoid that hook at the end of a fraudster’s line
Phishing is the attempt to obtain personal, private, or commercial assets – usually information or funds – by impersonating a trustworthy source. Fraudsters commonly use email phishing scams to trick their prey, but messaging apps, social media, fake websites and phone calls can also be part of the picture. Mass-mailing phishing attacks appear to be subsiding, but this shouldn’t lull business and IT managers into a false sense of security, as attackers are now focusing their efforts on spear-phishing campaigns. Using cleverly crafted messages and a range of exploits to bypass traditional email security measures, it’s estimated that perpetrators have already tricked unsuspecting businesses out of $5 billion. This Temperature Check of 330 IT professionals reveals that attackers are regularly impersonating senior managers and targeting specific business departments. So, what’s to be done?
Download the Research Note to read more …
Through our research and insights, we help bridge the gap between technology buyers and sellers.
Have You Read This?
Generative AI Checkpoint
From Barcode Scanning to Smart Data Capture
Beyond the Barcode: Smart Data Capture
The Evolving Role of Converged Infrastructure in Modern IT
Evaluating the Potential of Hyper-Converged Storage
Kubernetes as an enterprise multi-cloud enabler
A CX perspective on the Contact Centre
Automation of SAP Master Data Management