Modern trends in enterprise computing—the rise of social media, the cloud, mobility and the era of big data—make threats from employees, contractors, partners and others with trusted access harder to identify, and give insiders more ways to pass protected information with less chance of discovery. Social engineering has turned an annoyance like spam into a legitimate attack vector, as for-profit operators create and sell spam campaigns to trick inadvertent insiders to open an attachment or click on a link. Every organization is under attack; through rigorous practices such as monitoring and maintenance of privileged access and network forensics, enterprises can better manage and monitor users and networks for both security and compliance.
Learn more: Read the IBM X-Force Threat Intelligence Quarterly – 2Q 2015
WW Demand Generation Marketing Manager