Protection from phishing
Social engineering is nothing new, with criminals using psychological manipulation since the days of The Trojan Horse. The most successful and widely used form of attack in the modern day is phishing, with attackers using email to trick users into taking action. Email addresses are easily spoofed, email content appears legitimate and the user is manipulated into opening or downloading a compromised document so that a malware attack can be launched.
- 0 % fall for phishing emails McAfee experiment 2016
- 0 % cyber attacks begin with spear phishing email Symantec 2016
- 0 % increase in phishing sites Q1 2016 APWG 2016
Defendpoint stops the attack
Be savvy to social engineering and reduce risk.
User education and training is not enough to stop a social engineering attack. Defendpoint stops malware from executing by controlling the applications that are allowed to run in your environment. By removing admin rights from all users and instead assigning them to applications, tasks and scripts, each employee has only the necessary privileges to perform their job role – without impacting productivity.
Know your threats series: Social engineering
Download your ultimate guide to social engineering and learn how to stop the attack.
- Overview of social engineering attacks and what to look for
- Real examples of successful breaches
- All the latest stats, evidence and expert opinion
- Practical advice to avoid social engineering scams