Protecting Your Health System from Imposter-based Emails
Most CISOs agree that the greatest vulnerability to their networks comes not from their technology, but their people. Since the cyber-criminals know this too, it’s no surprise they’ve been targeting health systems using business-compromise emails. These emails target specific pre-selected individuals — based on their roles and likely access — and appear to be coming directly from leaders inside the organization. In this timely webinar, we’ll hear more about these frighteningly effective attacks and learn just how IT professionals can empower their people to know a legitimate request from a con.
About our Sponsor: Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.