abstract image of fish hook snagging red tab in circuit board (Photo: JLStock/Shutterstock)

The key to any robust cyber defense strategy involves two things: insight into your own vulnerabilities and insight into evolving adversarial tactics — only then can you truly build defenses that align with evolving enemy strategies. A report by Kroll, a U.S. provider of technology and insights related to risk and governance, claims the threat environment remains complex, and attackers are increasingly targeting email for initial access and extortion.

Following is a high-level summary of their findings.

Complete your profile to continue reading and get FREE access to BenefitsPRO.com, part of your ALM digital membership.

Your access to unlimited BenefitsPRO.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Critical BenefitsPRO.com information including cutting edge post-reform success strategies, access to educational webcasts and videos, resources from industry leaders, and informative Newsletters.
  • Exclusive discounts on ALM, BenefitsPRO magazine and BenefitsPRO.com events.
  • Access to other award-winning ALM websites including ThinkAdvisor.com and Law.com

Already have an account?

 

BenefitsPRO

Join BenefitsPRO

Don’t miss crucial news and insights you need to navigate the shifting employee benefits industry. Join BenefitsPRO.com now!

  • Unlimited access to BenefitsPRO.com - your roadmap to thriving in a disrupted environment
  • Access to other award-winning ALM websites including ThinkAdvisor.com and Law.com
  • Exclusive discounts on BenefitsPRO.com and ALM events.

Already have an account? Sign In Now
Join BenefitsPRO

Copyright © 2022 ALM Global, LLC. All Rights Reserved.