Intelligent CIO Middle East Issue 58 | Page 77

t cht lk mishandling of data – can have significant, far-reaching consequences. In order to do that, companies need to ensure they deploy regular and effective security awareness training to educate employees about best practices as well as establish a people-centric strategy to defend against threat actors’ unwavering focus on compromising end users. What should a robust email security strategy look like? The best email security strategies foster a combination of technology and people. With the constant uptick in phishing attacks, it’s vital that businesses invest in modern email security solutions to detect and block as much of these threats as possible, removing the guess work from users. We recommend that organisations prioritise a people-centric approach to security that protects all parties (their employees, customers and business partners) against “ EMPLOYEE EDUCATION AND SECURITY AWARENESS IS OFTEN THE DIFFERENCE BETWEEN AN ATTEMPTED CYBERATTACK AND A SUCCESSFUL ONE. these threats, including layered defences at the network edge, email gateway, in the cloud and at the endpoint, along with strong user education. How is Proofpoint helping to secure organisations? Proofpoint invests 20% of revenue back into R&D – one of the highest in the industry – to ensure our products stay ahead of emerging threat tactics. Email is the preferred tactic for targeted attacks, from fraudsters to large scale cybercriminals to nation states. With accurate malware detection and blocking, coupled with credential phishing and email fraud protection, Proofpoint Email Security drastically reduces potential information loss and financial consequences due to infection and compromise. Technical solutions and controls, while important, are just one aspect of a broad and deep defence. The cornerstone is regular, comprehensive and adaptive employee training. Proofpoint Security Awareness Training is focused on engaging end users and arming them against realworld attacks. Proofpoint does this by using personalised training based on our industryleading threat intelligence to reduce an organisation’s risk. • www.intelligentcio.com INTELLIGENTCIO 77