A Perfect Storm for Social Engineering: Anticipating the Human Element in Post-Pandemic Cybersecurity

The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.

The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are central components of cybersecurity. But because threat actors understand human behavior, they know how to manipulate it to achieve their goals—stealing money and valuable information from organizations worldwide.

Download the white paper, written by behavioral scientist Steve Crimando to learn:

  • Why humans are the weakest link in a cybersecurity strategy
  • How the COVID-19 pandemic has changed human behavior
  • Which tactics are most used by cybercriminals to take advantage of the human element

Fill out the form to receive your copy of the white paper.

After reading this white paper, you are eligible for .5 CPE credits through (ISC)².

A Perfect Storm for Social Engineering: Anticipating the Human Element in Post-Pandemic Cybersecurity

Download Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B 5 15 23 Saskatoon PS
Saskatchewan’s largest school division uses Abnormal to detect and auto-remediate advanced attacks, reclaim time, and save money.
Read More
B CISO Fireside Chat OD Webinar
Cybersecurity leaders from Rubrik, Noname, Wiz, and Abnormal Security share their experiences and insights in this on-demand CISO fireside chat.
Watch Now
B 1500x1500 Rubicon Case Study L1 R1
Abnormal has eliminated the waste of reviewing copious email alerts and false positives, allowing the Rubicon team to focus on more strategic initiatives.
Read More
B TAG Cyber Buyers Guide
Download the buyer's guide for valuable advice on effectively securing cloud email environments and choosing the right cloud email security solutions provider.
Download Now
B Video Redefining Cloud Email Security
Abnormal's Head of Marketing, Arun Singh, explores the new solutions and strategies needed for the detection of and defense against advanced email attacks.
Watch Now
B 1 05 22 VBCPS
With a small team, complex challenges, & limited resources, Virginia Beach City Public Schools needed better security tools. Learn why they chose Abnormal.
Read More
B 04 20 23 Gartner report
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
B Securing Cloud Email Video
Abnormal Security's CISO, Mike Britton, shares how enterprises can protect their cloud email environments from inbound attacks and email platform attacks.
Watch Now
B Abnormal for K 12 Education
Schools are increasingly popular targets for advanced email attacks. See how Abnormal blocks these threats.
Read More