Turning the tables
How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Cybercriminals have shifted their attention from infrastructure to people. They’ve realized that exploiting people's social instincts through email is much more effective than alternative methods.
Email is universal, critical to modern business, but inherently insecure. This paper shares strategies that will improve your organisation’s security posture and create a more streamlined abuse mailbox.
The strategies include:
- How to make email reporting easier for users and the IT team.
- Measuring the reporting rate of phishing simulations.
- Showing users how they can report more accurately.
Download now
Provided by Proofpoint
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
HPE ProLiant Compute DL345 Gen12 reviewReviews The big EPYC core count and massive memory capacity make this affordable single-socket rack server ideal for a wide range of enterprise workloads
-
What is a vector database?Explainer Storing data as mathematical values provides critical functionality for ML and AI
-
The Data Security Playbook for Insurance Leaderswhitepaper
-
How Thales Helps Meet Compliance Requirements in Europewhitepaper
-
Digital Operational Resilience Act (DORA)whitepaper
-
Your Foundation for Innovation: Cyber Resilience for the Modern Data Centerwhitepaper
-
Dell PowerProtect Backup Services Ransomware Survival Guidewhitepaper
-
Dell PowerProtect Cyber Recoverywhitepaper
-
Security experts warn Substack users to brace for phishing attacks after breachNews Substack CEO Christ Best confirmed the incident occurred in October 2025
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
