2024年网络钓鱼报告

proofpoint.com2024 State of the Phish Risky actions, real-world threats and user resilience in an age of human-centric cybersecurityREPORTINTRODUCTIONImagine a successful cyberattack against your organization. What does it look like? Maybe it involves a fiendishly clever piece of social engineering—a convincing lure that catches the recipient off guard. Or maybe it would take a smart technical exploit to get past your defenses. But in reality, threat actors don’t always have to try that hard. Often, the easiest way to breach security is to exploit the human factor. People are a key part of any good defense, but they can also be the most vulnerable. They may make mistakes, fall for scams or simply ignore security best practices. According to this year’s State of the Phish survey, 71% of working adults admitted to taking a risky action, such as reusing or sharing a password, clicking on links from unknown senders, or giving credentials to an untrustworthy source. And 96% of them did so knowing that they were taking a risk. When obliged to choose between convenience and security, users pick the former almost every time. So, what can organizations do to change this? In this report we’ll take a closer look at how attitudes towards security manifest in real-world behavior, and how threat actors are finding new ways to take advantage of our preference for speed and expedience. We’ll also examine the current state of security awareness initiatives, as well as benchmarking the resilience of people and organizations against attack. The foundation of this report is a survey of 7,500 end users and 1,050 security professionals, conducted across 15 countries. It also includes Proofpoint data derived from our products and threat research, as well as findings from 183 million simulated phishing messages sent by our customers over a 12-month period and more than 24 million emails reported by our customers’ end users over the same period. 2024 STATE OF THE PHISH \ REPORT2TABLE OF CONTENTSConclusion 27Key Findings4Security Awareness Trends Current state of security awareness Areas for improvement 10 1012Organizational Benchmarks Industry failure rate 20 21The Threat Landscape Threat prevalence Growing threats: TOAD, MFA-Bypass, QR codes and generative AI BEC attacks benefit from AI Microsoft remains most-abused brand Ransomware still a major concern Attack consequences141415 16161718Security Behaviors and Attitudes End-user behavior and attitudes 6 62024 STATE OF THE PHISH \ REPORT3KEY FINDINGSof organizations were infected by ransomware.attacks are launched with MFA-bypass framework EvilProxy every month, but 89% of security professionals still believe MFA provides complete protection against account takeover.69%of users took a risky action71% of them knew they were doing something risky96% andOver 1 millionBEC attacks were detected and blocked on average per month by Proofpoint.66 million42024 STATE OF THE PHISH \ REPORTof users who took risky actions eng

立即下载
综合
2024-08-23
29页
1.42M
收藏
分享

2024年网络钓鱼报告,点击即可下载。报告格式为PDF,大小1.42M,页数29页,欢迎下载。

本报告共29页,只提供前10页预览,清晰完整版报告请下载后查看,喜欢就下载吧!
立即下载
本报告共29页,只提供前10页预览,清晰完整版报告请下载后查看,喜欢就下载吧!
立即下载
水滴研报所有报告均是客户上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作商用。
相关图表
行业重要动态
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
主产区生鲜乳平均价走势 图 34:牛奶、酸奶零售价走势
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
22 省市玉米平均价格走势 图 32:22 省市豆粕平均价走势
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
啤酒月度产量及同比增速走势(单位:万千升,%) 图 26:啤酒月度进口量及进口平均单价走势(单位:万千升,%)
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
次高端白酒主要单品批价走势
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
酒水板块个股沪(深)股通持股占比
综合
2024-08-19
来源:食品饮料行业酒水饮料周报:迎驾贡酒Q2利润超预期,季报催化持续
查看原文
回顶部
报告群
公众号
小程序
在线客服
收起