NEWSLETTER
 |  LOGIN
 |  SIGNUP
Locate all InformationSecurity resources, white papers, articles, blogs and videos here
NEWSLETTER
|
LOGIN
|
SIGNUP
News
Featured News
Trending News
Archive News
Events
All Events
Past Events
Upcoming Conferences
Past Conferences
Live Webinars
On-demand Webinars
Companies
Marketplace
C-Suite On Deck
Thought Leaders
Resources
Videos
Webinars
Articles
Infographics
Whitepapers
JavaScript has been disabled on your browser. The website might not work properly unless you enable it.
home.aspx
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
I agree to the
terms of service
and
privacy policy
.
.
https://informationsecurity.report/Resources/Whitepapers/5b87d51e-97fd-486e-83be-86536ccc151f_cyber.pdf
PLEASE CORRECT THE FOLLOWING:
Please Enter Some Keywords
Enterprise Social Cyber Attack
infographic
SHARE
SHARE
SHARE
By now, social media has clearly established itself as a dominant force in our lives: Nearly three-quarters of adults who go online use a social network of some kind. More than two of five use multiple social network sites. As a result, cyber criminals are flocking to these sites to trigger attacks, targeting users and organizations. In fact, one-third of data breaches originate via social networks, and companies suffer an average of $5.4 million per attack. [1] Still only 36 percent have instituted the bare minimum of social media training for employees and even fewer have active Social Risk Management programs. [2] Employees are directly in the crosshairs and the “Anatomy of an Enterprise Social Cyber Attack” serves as an introduction to the attack methodologies of adversaries. Through the following tactics, seven in ten individuals fall prey to a cyber attack – putting their employer organizations at risk in the process. Here’s what you need to safeguard against.
DOWNLOAD
I'm for real
Enter your email once to access all our information and resources.
(Your email address is required so we know you're a real person)
By downloading this content, you give permission for your contact information to be shared with the content provider who may contact you in regards to the content.