Download our State of the Phish™ Report
Explore data from tens of millions of simulated phishing attacks, plus strategies for reducing risk.
Connect:
XIn the world of corporate information technology, 2011 was all about security. We saw that hackers have become increasingly sophisticated and persistent in their efforts to exploit the end-user as the weakest link. To some, 2011 probably seemed like a long series of headline-grabbing security breaches - think RSA, Epsilon, IMF, Lockheed Martin, FBI, Sony Play Station Network and Citigroup breaches, to name just a few. And this was just the tip of the iceberg, as many breaches continue to go unreported. So what's coming in 2012?