THE STATISTICAL ANALYSIS OF 126,000 PHISHING SIMULATIONS CARRIED OUT IN 128 COMPANIES AROUND THE WORLD 1

February 14, 2018

Over 91% of system breaches have been caused by a phishing attack. Today, phishing attacks continue to be one of the most successful attack types initiated by email. This is especially true for spear phishing, an attack schemed against a certain individual, which has been popular in manipulating high-profile incidents. In this study, inidividual business departments were investigated and a risk percentage was determined according to emails opened, links clicked and forms submitted. Our study is significant in the sense that it will help companies in their cyber security and awareness efforts and guide their focus on the departments that are more vulnerable to social engineering attacks.

Spotlight

ReaQta

ReaQta develops an innovative advanced endpoint protection system based on a NanoOS capable of working between the operating system and the hardware. The privileged position on the system allows for a full control over exploitation attempts, malware infections and data exfiltration. A real-time Artificial Intelligence analysis system augments the whole protection both on the client and on the backend, alerting the security team about attacks, exfiltration attempts and anomalous behaviours.

OTHER WHITEPAPERS
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Cisco’s Private 5G Solution Security Overview

whitePaper | October 12, 2022

Cisco’s Private 5G (P5G) solution, offered as a service, is designed to fit seamlessly into existing enterprise networks and provide private cellular networking capabilities for that enterprise. The solution builds on Cisco’s enterprise networking best practices and a clear understanding of enterprises’ understanding and expectations of private networks.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More

Spotlight

ReaQta

ReaQta develops an innovative advanced endpoint protection system based on a NanoOS capable of working between the operating system and the hardware. The privileged position on the system allows for a full control over exploitation attempts, malware infections and data exfiltration. A real-time Artificial Intelligence analysis system augments the whole protection both on the client and on the backend, alerting the security team about attacks, exfiltration attempts and anomalous behaviours.

Events