Stay Vigilant – The weakest point in your security is YOU!
Today’s advanced attacks focus more on exploiting human flaws than system flaws. Named Leader in Gartner’s magic quadrant for secure e-mail gateways – Proofpoint – has developed ‘The Human Factor 2016’ to explore this under-reported aspect of enterprise threats.
Download The Human Factor 2016

VIDEO: "Locky" Attacks
Proofpoint researchers discovered "Locky" being distributed via MS Word documents with malicious macros. Locky stands out above other new ransomware.... Find Out Why Here...

9 Defensive Steps
Attackers know that people make the best exploits and so firms holding confidential data such as legal are having to batten down the hatches and defend themselves - Here's How...
Twitter Feed
@NETprotocol
Two-factor authentication (#2FA) compromised: Microsoft account takeover. Here's how to find out if your 2FA is wor… https://t.co/lfKhS7PDEr
About 7 hours ago
@NETprotocol
Looking for somebody to take care of your #DataErasure requirements? Our preferred partner @BlanccoTech provides fu… https://t.co/8Cd2WcvHFN
24 February