Download PDF version Contact company

Steve Bradford, Senior Vice President EMEA, SailPoint, “Phishing attacks continue to be a gateway for deceiving people into handing over sensitive information with the latest technique misleading people into clicking on blank email images which have an embedded, malicious URL link hidden in plain sight."

With cybercriminals becoming far more sophisticated in their tactics, all it takes is for a malicious email to slip through and an unsuspecting employee to click on it for a cyber-criminal to get their hands on sensitive data." 

Cause of cyberattacks 

At their root, many of these attacks come down to some type of compromised identity, with user access points often targeted. Organisations have a vital role to play in not only increasing training and awareness for staff to spot suspicious and ‘out-of-the-ordinary requests but to also better safeguard their identities."

"To reduce the risk of attacks, leveraging AI-enabled identity security will be key, allowing organisations to see, understand, and manage who has access to what, and why, this should be standard best practice for cyber security.”

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?