Steve Bradford, Senior Vice President EMEA, SailPoint, “Phishing attacks continue to be a gateway for deceiving people into handing over sensitive information with the latest technique misleading people into clicking on blank email images which have an embedded, malicious URL link hidden in plain sight."

With cybercriminals becoming far more sophisticated in their tactics, all it takes is for a malicious email to slip through and an unsuspecting employee to click on it for a cyber-criminal to get their hands on sensitive data." 

Cause of cyberattacks 

At their root, many of these attacks come down to some type of compromised identity, with user access points often targeted. Organizations have a vital role to play in not only increasing training and awareness for staff to spot suspicious and ‘out-of-the-ordinary requests but to also better safeguard their identities."

"To reduce the risk of attacks, leveraging AI-enabled identity security will be key, allowing organizations to see, understand, and manage who has access to what, and why, this should be standard best practice for cyber security.”

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...