Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack. Credit: Oleksii/Adobe Stock

Nearly one-third of email users are likely to click on a suspicious link or comply with a fraudulent request. Cybercriminals understand that people are even more likely to open a message from a seemingly reliable source, such as the HR department.

Continue Reading for Free

Register and gain access to:

  • Breaking benefits news and analysis, on-site and via our newsletters and custom alerts
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the property casualty insurance and financial advisory markets on our other ALM sites, PropertyCasualty360 and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.