One Article Review

Accueil - L'article:
Source ProofPoint.webp ProofPoint
Identifiant 8471991
Date de publication 2024-03-28 10:21:02 (vue: 2024-03-28 13:08:52)
Titre Améliorations de la sensibilisation à la sécurité de ProofPoint: 2024 Release hivernale et au-delà
Proofpoint Security Awareness Enhancements: 2024 Winter Release and Beyond
Texte Proofpoint Security Awareness has long been at the forefront of innovative awareness strategies. In today\'s complex threat landscape, a human-centric strategy has never been more important. And we have never been more dedicated to creating a program that helps users change their behavior.   In this post, we share a few enhancements that show how committed we are to helping users transform their behavior. We cover a key educational campaign and outline the benefits of several new functional enhancements within four focus areas.  1: Keeping users engaged   There are two recent and upcoming enhancements in this focus area.  We launched the Yearlong campaign: Cybersecurity Heroes  We released this pioneering, comprehensive educational program late last year. It provides an ongoing, curriculum-based approach to cybersecurity training. It is a testament to our belief in the power of continuous learning and helping users change their behavior.   The Cybersecurity Heroes campaign covers an array of key security topics in detail every month. Here are a few examples:   Elements of data encryption  Intricacies of strong password protocols  Deceptive nature of ransomware  Long-term training schedules can be an administrative burden. That\'s why we\'ve made this training available through stand-alone monthly modules. This flexibility helps ease administrative workloads.   An article from the Cybersecurity Heroes campaign.  QR code phishing simulations will launch soon  In the second quarter of 2024, we will be releasing QR code phishing simulations. They are our proactive response to a novel and alarming trend. Recent intelligence from industry-leading analyses, including an eye-opening blog on QR code phishing from Tessian, underscores the urgent need for education. QR code phishing attacks are on the rise. Yet, 80% of end users perceive QR codes as safe. This highlights a dangerous gap in threat perception.   How a QR code phishing attack works.  Our new simulations will provide administrative visibility into which users are most vulnerable to an attack, as well as a dynamic environment for users to hone their threat detection abilities in alignment with real-world scenarios. They are based on our threat intelligence and designed to challenge and refine user reactions. With an understanding of who is most at risk and how users may react to a QR code phishing attack, administrators will be able to design a program that is tailored to each individual, resulting in maximum learning comprehension and retention.  QR code phishing simulations will be available in the second quarter of 2024.  2: Enhancing how people learn  We want to help businesses maximize their users\' learning comprehension and behavior change. One recent enhancement in this focus area is the integration of “Phish Hooks” into Teachable Moments. It was released in late 2023.   Here\'s how it helps users learn better and retain what they\'ve learned.  “Phish Hooks” is now integrated with Teachable Moments   This enhancement helps users understand why a phishing simulation would have been an actual threat. Users get immediate and clear feedback so that they know what to look out for next time.  A view of Teachable Moments with “Phish Hooks.”  By dissecting the anatomy of a phishing attack, we can give a big boost to a user\'s ability to critically assess an attack. That, in turn, helps them to improve their understanding and retention of safe cybersecurity behaviors.  3: Gaining visibility into vulnerable users  Proofpoint recognizes that security administrators play a critical role in orchestrating awareness efforts. That is why we refined our Repeat Behavior Report. It\'s designed to help administrators identify the users who can benefit from targeted training about phishing risks. Here\'s how.  The Repeat Behavior Report is more detailed  This enhancement gives you actionable insights that can help you identify vulnerability trends. To this end, the report now provides a more de
Envoyé Oui
Condensat 2023 2024 abilities ability able about access access  action actionable actions actual adapt adaptive add added addresses administrative administrator administrators advantage affiliations ahead alarming alignment aligns allocation alone also analyses anatomy any approach are area areas array article assess assignment assignments assignments  attack attacked attacks attribute attributes audiences automate automatically available awareness a key based because been behavior behaviors belief benefit benefits better between beyond big blog boost build burden businesses but campaign campaign: can centric challenge change checkbox clear click clicker code codes committed complex comprehension comprehensive conduct contact content continually continuous corresponding count cover covers create creating creation credentials critical critically culture curriculum curriculums customization customize cybersecurity dangerous data date deal deceptive dedicated deeper defined delivering department departmental deploy derive design designed detail detailed detailed  detection develop directed directory dissecting domains  dynamic each ease easier education educational efficient  efforts elements encourage encryption  end engage engaged   engagement enhance enhancement enhancements enhancements: enhancing enjoy enroll enrolled enrollment ensures entering entry environment every example examples examples:   expanded expected experience explorer explorer  eye fail failure fake feedback filter filters filter  finance” flexibility focus focused forefront four free from further gaining gap get give gives goals group grouped groups growth has have help helping helps here heroes heroes  highlights hire hone hooks hooks” how human identify identity immediate impactful important improve including individual industry innovative insights integrated integration integrations integration  intelligence interlinked intricacies intuitive journey keeping key know landscape languages  last late latest launch launched leading learn learned learning learn  let level library like likely links long longer look looking lot made management manual materials  maximize maximum may means membership might minimize modules moments moments   month monthly more more  most nature necessary need never new new functional next nexus not novel now often on:  one ongoing only opening orchestrating organizational out outline overhauled password people people™ perceive perception phishing pioneering plans platform play post power practitioners pre predefined primary proactive process processes profile profiles program programs proofpoint protection protocols  prove provide provides quarter quicker ransomware  rapidly rate react reactions real rearchitected receive recent recognizes refine refined release released releasing relevant repeat repeatedly report required resources resources  response resulting retain retention rise risk risks risky role roles safe saving say scenarios schedules search searches second security see several share show simple simulation simulations simulations  solution some soon  sophisticated specific stand strategic strategies strategy streamline strong such tailored take tap tap  target targeted teachable teaches teaser templates term tessian testament that them themes these they threat through time today together too top topics tracked training transform trend trends turn two underscores understand understanding unique upcoming urgent use user users users  very view vigilance visibility vulnerability vulnerable want wanted wealth website well what when which who why will winter within work workloads works world would year yearlong yet your “accounting “phish
Tags Vulnerability Threat Prediction
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: