Source |
ProofPoint |
Identifiant |
8636731 |
Date de publication |
2025-01-13 13:21:11 (vue: 2025-01-13 14:07:57) |
Titre |
Securing the Public Sector: How One County Strengthened Microsoft Email Security with Proofpoint |
Texte |
Public sector organizations are particularly vulnerable to cyber threats. This is largely because so much of the data about their operations and personnel is publicly accessible. Procurement data, departmental contacts and employee details can all be used by attackers to craft highly convincing phishing campaigns as well as other targeted threats. When this is combined with the critical nature of the services that they provide, it\'s no wonder why government entities are prime targets for cybercriminals.
In this blog, we explore the recent success story of a county government (referred to here as "the County"), which exemplifies how public sector organizations can overcome these challenges. With advanced threat detection, tailored training and exceptional support, Proofpoint helped the County achieve a robust, human-centric security posture.
The scenario
The County\'s top concerns included raising awareness about phishing threats and training its employees to recognize and avoid these attacks. While the County was already using Microsoft Defender for Office 365 email security, it also wanted to see if Proofpoint could offer more protection.
During initial discussions about security awareness training, the County was steered toward Proofpoint ZenGuide. It found our comprehensive approach to educating users on identifying and responding to phishing threats appealing. That meeting, in turn, led to questions about the County\'s email security posture. Those talks quickly expanded to include evaluating the effectiveness of the County\'s current Microsoft email security measures with a Proofpoint Email Rapid Risk Assessment (RRA).
A Rapid Risk Assessment reveals hidden threats
Two weeks later, the RRA provided some startling insights. Proofpoint found that about 20% of the emails delivered by Microsoft were malicious. These included phishing attempts that targeted people working in the County\'s most vulnerable and critical departments, mainly payroll and accounting. Proofpoint identified these users as "Very Attacked People" (VAP).
The results of the RRA exposed significant gaps in the County\'s existing Microsoft email security. When its leadership saw concrete data about the threats that were reaching its employees, it called for immediate action. As a result, the County ended the RRA early and approved the deployment of Proofpoint Threat Protection.
Implementation moves forward quickly
Time was of the essence. At their request, Proofpoint sped up implementation and completed it within the same month. To avoid disrupting workflows, Proofpoint seamlessly integrated with the County\'s existing email platform.
Our professional services team offered support throughout the process. Not only did it work to simplify the initial configuration, but it also addressed any challenges. Despite the deployment\'s complexity, it delivered rapid and tangible improvements that justified the investment and effort.
Why Proofpoint stood out
Three key factors were behind the County\'s decision to use Proofpoint:
Unmatched threat detection. We demonstrated superior capabilities in identifying and blocking threats that Microsoft Defender missed. The fact that Proofpoint can also pinpoint VAPs and provide detailed insights about threats that are targeting them only strengthened the County\'s confidence.
Data-driven decision-making. The RRA provided tangible evidence of gaps in their existing security measures. By showing the CIO exactly how many threats were reaching high-risk employees, Proofpoint made a compelling case for augmenting their Microsoft 365 email security.
Outstanding reputation for support. Known for responsiveness and expertise, our professional services team delivered excellent customer support. It ensured a smooth onboarding process and minimized disruption.
Looking ahead
The successful deployment paved the way for additional projects with Proofpoint. The County is now considering o |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
365 about accessible accounting achieve action adaptive additional addressed adopt advanced against agencies ahead all alongside already also analysis any appealing approach approved are assessment attacked attackers attacks attempts augment augmenting authentication avoid awareness baseline because behavioral behind benchmark blocking blog brief: but called campaigns can capabilities case caused centric challenges cio click combined compelling completed complexity comprehensive concerns concrete confidence configuration considering contacts controls convincing could county county: craft create critical current customer cutting cyber cybercriminals cybersecurity data decision deeper defend defender defense delivered delivery demonstrated departmental departments deployment depth despite detailed details detection detects did discussions disrupting disruption dmarc download driven during early educates educating effectively effectiveness effort elevating email emails emails employee employees ended enforcement enhance ensured entire entities environments essence evaluating every evidence exactly example excellent exceptional exemplifies existing expanded expertise explore exposed fact factors false focus focusing forward found foundation from future gained gaps good government groups has have helped helps here hidden high highly how human identified identifying immediate implementation implemented important improvements improvements incidents include included initial initiatives insights integrated intelligence investment issues its justified keeping key known largely later leadership learn learning led less lessons like link looking low machine made mainly making malicious managed many measures meeting messages microsoft million minimized missed modern month more most moves much multilayered nature need new nexus not notably notice now offer offered offers office onboarding one ongoing only operations organizations organizations other out outstanding overcome particularly paved payroll people personnel phishing pinpoint platform positive post posture powered pre prime proactively process procurement professional program projects proofpoint proofpoint: proofpoint: protected protection provide provided provides public publicly questions quickly quickly raising range rapid rate rather reaching reactively recent recognize reduced referred region related reported reputation request resolving responding responsiveness result results reveals risk robust rra safe same sandbox saw scenario seamlessly sector sector: secure securing security see seeing semantic sensitive services set showing shown significant significantly simplify smooth solid solution some specific sped stack stakes standards startling steered stood stops story strategic strategies strengthen strengthened stronger success successful superior support tailor tailored take talks tangible target targeted targeting targets team than them them these those threat threats threats three throughout time together tool tools top toward training turn two unique unmatched use used user users using vap vaps very visibility vulnerable wanted way weeks well when which why wide within wonder work workflows working workloads your zenguide our |
Tags |
Tool
Threat
Legislation
|
Stories |
|
Move |
|