The Human Factor: Malicious Insiders vs. Negligent End Users

About this webinar

Recorded: September 12, 2018

Breaches resulting from insider misdeeds are front-page news on a regular basis. Unfortunately, the average employee misses a critical common thread across many these stories: that the root cause of the incident was a non-malicious but uninformed person just like them. It’s up to IT pros to understand the techniques attackers use, educate their users to avoid common traps, and take the necessary steps to avoid breaches.

In this webinar, Liam Cleary explains:

  • Common attacks that exploit unwitting end users: websites infected with malware, phishing e-mails, social engineering and so on
  • Best practices for increasing the security intelligence of business users
  • Ways to avoid data theft by disgruntled workers and corporate spies
Hosted by
Jeff Melnick,
Solutions engineer
Liam Cleary,
Office Apps and Services MVP

How Attackers Exploit Office 365 Vulnerabilities

Office 365 has become the platform of choice for document collaboration and sharing. If you're using Office 365 or planning to migrate there, understanding the types of security attacks you can expect is imperative. Microsoft provides tools for testing your end users by simulating some of the most common attacks, so you can educate them as part of your broader defense strategy.

In this webinar, you'll discover:

  • Unconventional Office 365 attack techniques
  • How to test your end users
  • How to spot attacks in early stages so you can take steps to prevent a breach
  • How you can keep your executives mailboxes safe
17
October
10:00am PDT
17 October, 10:00am PDT
Register Now