The cyber threat landscape is so vast and complex that it often leaves security teams feeling overwhelmed, uncertain as to where to apply limited resources. This is why a data-driven defense strategy is needed – understanding and identifying the most common ways organizations are being attacked or compromised; ranking those methods in order of their risk profile and likelihood, then finally deploying mitigations to reduce those risks.
It is no secret that 68 percent of breaches stem from one thing and one thing alone — social engineering. Unfortunately, organizations struggle to block social engineering because it relies so heavily on manipulating human behavior, something they have little control over. To harness or control human behavior, organizations must adopt a defense-in-depth philosophy, or a layered approach consisting of the following elements:
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.