Turning the tables
How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
Cybercriminals have shifted their attention from infrastructure to people. They’ve realized that exploiting people's social instincts through email is much more effective than alternative methods.
Email is universal, critical to modern business, but inherently insecure. This paper shares strategies that will improve your organisation’s security posture and create a more streamlined abuse mailbox.
The strategies include:
- How to make email reporting easier for users and the IT team.
- Measuring the reporting rate of phishing simulations.
- Showing users how they can report more accurately.
Download now
Provided by Proofpoint
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
The SMB Guide to Ransomware Recoverywhitepaper
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businessesNews Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
Zephyr Energy hackers swiped £700,000 after redirecting a contractor paymentNews Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented
-
Email Security at an Inflection Point: The 2026 Strategy Reportwhitepaper
-
The Network Penetration Testing Buyer’s Guidewhitepaper
-
Top 10 Critical Pentest Findings Report for 2025whitepaper


