Strategies for protecting your company and your people from phishing attacks

From tproportal.com

Today, the weakest link in an organisation’s security has moved away from its infrastructure and on to its people.

null

In response to numerous high-profile breaches and brand-name vulnerabilities, many hardware and software providers have opted to implement stringent protections and secure defaults. As a direct result of their actions, finding typical “low-hanging fruit” vulnerabilities to breach organisations is becoming a much more difficult, expensive, and noisy attack vector.

Today, the weakest link in an organisation’s security has moved away from its infrastructure and on to its people. Knowing this, let’s consider how an organisation can implement security controls around its people, without violating their privacy and productivity.

Read more…