Mimecast PDF

Count Down to Compromise



Download now

Abstract


Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, vacation details, this is often the information that hackers use to target specific employees thru well-crafted, highly personalized emails. Employs are often the weakest link in your network defenses. This report looks at:

  • a step by step view of a hypothetical spear-phishing attack
  • 91% of hacking attacks begin with a phishing email.
  • The average firm goes 229 days before realizing it’s been breached.

This report depicts a highly accurate scenario of how easily attackers can penetrate defenses. To learn how to stop them, download this free white paper.