Ponemon Cost of Phishing and Value of Employee Training

"Ponemon Institute is pleased to present the results of the Cost of Phishing and Value of Employee Training study sponsored by Wombat Security. The purpose of this research is to understand how training can reduce the financial consequences of phishing in the workplace. The research reveals the majority of costs caused by successful phishing attacks are the result of the loss of employee productivity. Based on the analysis described later in this report, we extrapolate an average improvement of 64% from six proof of concept training projects. This improvement represents the change in employees who fell prey to phishing scams in the workplace before and after training."

Spotlight

Callsign

Friction-free Identification and Authentication. By using all of the thousands of data points available such as typing or swiping techniques, location, online habits, face recognition, devices, and yes even passwords, we can determine someone is who they say they are; we even know the Monday person can behave differently to the Friday person.

OTHER WHITEPAPERS
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Proven Ways to Prevent Ransomware Attacks

whitePaper | September 22, 2022

Ransomware is one of the fastest-growing and most costly cyber threats. According to a recent Perimeter 81 survey of over 500 IT professionals, 76% of respondents reported that their company experienced an attack within their organization.

Read More
news image

Harness Advanced Push-to-talk to Transform Physical Security Operations

whitePaper | December 21, 2022

Hytera’s mission is to develop the future-proof solutions with a holistic approach to your critical communications system and service needs, support public safety agencies in making the city safer, and enable security organisations to keep the enterprise more secure and ensure the safety and security of responders and staff, through driving more efficiency, effectiveness and productivity to operation and management of both daily operations and critical emergencies, while reducing the cost.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More

Spotlight

Callsign

Friction-free Identification and Authentication. By using all of the thousands of data points available such as typing or swiping techniques, location, online habits, face recognition, devices, and yes even passwords, we can determine someone is who they say they are; we even know the Monday person can behave differently to the Friday person.

Events