A CISO’s Guide: Mitigating the Human Risk Factor

This article has been indexed from Help Net Security

Security teams deploy several technologies to protect their attack vectors (network, endpoints, email, web, cloud apps, etc.). But what about the human attack surface? Verizon’s 2021 data breach report shows phishing is responsible for the vast majority of breaches and Business Email Compromises were the second most common form of social engineering. Hackers tap into human cognitive biases to sway users’ decisions based on irrelevant or misleading information. Download this guide to better understand what … More

The post A CISO’s Guide: Mitigating the Human Risk Factor appeared first on Help Net Security.

Read the original article: A CISO’s Guide: Mitigating the Human Risk Factor