Webroot: ‘Tremendous’ Return Prompts Massive Jump in Phishing Attempts
…being consistent and vigilant enough in forcing all their employees to regularly prove they are aware of and able to avoid the latest phishing techniques,” Moffitt said. “In addition, organizations aren’t locking down access to powerful Windows tools that are rarely used by the end user, like PowerShell, macros, scripts, etc.”
MSSPs and other cybersecurity providers should be offering their partners the solutions they need to ensure cyber resilience through a defense-in-depth approach, he said. This involves addressing user behavior and determining the best level of protection for their specific network and endpoints, he said.
“In the cybersecurity industry, the only certainty is that there is no certainty, and there is no single silver bullet solution,” said Hal Lonas, OpenText‘s senior vice president and CTO, SMB and consumer. “The findings from this year’s report underline why it’s critical that businesses and users of all sizes ensure they’re not only protecting their data but also preparing for future attacks by taking simple steps toward cyber resilience through a defense-in-depth approach that addresses user behavior and the best protection for network and endpoints.”
- Page 1
- Page 2