While properly configured technical controls can go a long way in protecting from cyber threats, there are countless threats that defeat even the best technology solutions. Those threats most often emanate from email and are intentionally designed to bypass blocking controls in an attempt to trick our last line of cyber defense – the users. Furthermore, with email enduring as the most likely ingress for a cyber attack, threat actors have the odds of a successful attack on their side. With those odds in their favor, it’s no wonder attackers continue engineering convincing phishing campaigns to hijack our attention.
The How Threat Actors Hijack Attention: The 2022 Social Engineering Report by Proofpoint highlights social engineering techniques that continue to be effective at exploiting the human element. The report provides comprehensive insights on how threat actors usurp trust, leverage additional technologies, and structure their messaging to prey on human behaviors, instincts, and emotions. Members are encouraged to review the report and may find the insights useful to bolster security awareness programs. For access to the report, visit Proofpoint.