Monday, November 28

Corporate phishing and its new DLP policies

large business phishing attacks

The world of work and business has changed with the consolidation of hybrid work environments. However, many of the security policies and procedures have not yet been updated.

On this, the report State of the Phish 2022 by Proofpoint, shows that cybercriminals have been more successful in 2021 than in previous years, attacking the most valuable asset of organizations: people.

Adopting solutions that provide visibility into human-centric threats and incidents across all channels enables modernization of corporate DLP policies. Our approach maintains scalability, ease of use, and security to enable organizations to move forward without compromising the security of their data.”, explains Fernando Anaya, general director of Prootpoint in Spain and Portugal.

Phishing and protection improvements

General data protection controls applied to entire departments or organizations can be cumbersome, hampering productivity and leading to false positives. In fact, according to figures from Proofpoint, nearly 70% of organizations say that three out of four incident alerts they investigate with their traditional DLP solution are false.

A traditional DLP approach can detect suspicious activity, but provides no insight into behavior before, during, or after the movement of sensitive data, and offers little in the way of analysis of risky user behavior”, comments Fernando Anaya.

The rise of enterprise phishing forces companies to rethink their DLP policies

These are the four areas in which technology can contribute to establishing effective data protection policies that help prevent losses associated with data compromise:

  • Detect and prevent the compromise of corporate email accounts: A modern DLP solution helps organizations act quickly to detect and revoke permissions from malicious third-party apps and block known attackers as well as malicious IP addresses that could compromise the account.
  • Data loss detection and prevention: A modern DLP approach tailors detection, prevention, and response to the risk user and the sensitive data they have access to, whether it’s regulated data, intellectual property, or other sensitive business information.
  • Monitoring of internal risks and analysis of suspicious behavior: A current approach to insider threats offers a human-centric view of data movement and user activity to answer the “who, what, where, when” questions and intent around threat alerts and events. real-time security. This enables you to protect against data loss, control insider threats, and speed your response to user-driven incidents.
  • Faster and easier response to incidents: No more digging through application logs, manually correlating activity, or translating technical jargon for non-technical teams. A modern DLP and insider threat management (ITM) platform can address these issues and help speed your response to any user-driven security incident or event.
Also Read  Stadia's ambition has come to (almost) nothing: now it points to a "turnkey" service for companies

Leave a Reply

Your email address will not be published. Required fields are marked *