Reading Time: 3 minutes We now live in a world where digital communication and technology has become a large and complex part of society. Almost everything we touch is now interconnected, and leaving ...
In October 2018, Gartner released a report on remote browser isolation. It ruffled feathers a bit throughout the cybersecurity industry by suggesting that enterprises can no longer assume that their traditional detect-and-respond security strategy was enough to stop all web-based malware attacks. Analyst Neil MacDonald argued that enterprises should stop trying to detect every attack and instead focus on “containing the ability of the attacker to cause damage and reduce the surface area for attack.”
According to JPMorgan Chase CEO Jamie Dimon, “The threat of cyber security may very well be the biggest threat to the US financial system.” Coupled with the fact that financial services is one of the most highly targeted industries, it’s clear financial organizations are in trouble. Reports show a 56% year-over-year increase in digital threats targeting the sector, and according to new research, phishing is a key threat vector.
From a bad actor perspective, phishing is the cheapest and easiest way to infiltrate organizations and personal information to make a profit. By nature, humans are curious and are oft en overconfident when it comes to security. Phishing is an even greater threat for mobile users, too. Without key visual cues, like the ability to hover over a link to determine its destination, it is much easier for a user to make the simple mistake of clicking a bad link and falling victim to a phishing attempt. The popularity of social media has also made it much easier for hackers to find valid email addresses and research users’ life activities to create sophisticated, tailored phishing attacks. From a security perspective, there are typically three approaches to solving the phishing problem – email security gateways, web proxies and security training awareness – but each has its own limitations.
Copyright 2012 - 2020 The Cyber Chronicle | All Rights Reserved |