{"id":955,"date":"2024-05-27T13:13:38","date_gmt":"2024-05-27T13:13:38","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/27\/report-the-dark-side-of-phishing-protection\/"},"modified":"2024-05-27T13:13:38","modified_gmt":"2024-05-27T13:13:38","slug":"report-the-dark-side-of-phishing-protection","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/27\/report-the-dark-side-of-phishing-protection\/","title":{"rendered":"Report: The Dark Side of Phishing Protection"},"content":{"rendered":"<p>\u200bThe transition to the cloud, poor password hygiene\u00a0and\u00a0the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them &#8211; through email protection, firewall rules\u00a0and\u00a0employee education &#8211; phishing attacks are still a very risky attack vector.<br \/>\nA new report by LayerX explores the state of\u00a0The transition to the cloud, poor password hygiene\u00a0and\u00a0the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them &#8211; through email protection, firewall rules\u00a0and\u00a0employee education &#8211; phishing attacks are still a very risky attack vector.<br \/>\nA new report by LayerX explores the state of\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bThe transition to the cloud, poor password hygiene\u00a0and\u00a0the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them &#8211; through email protection, firewall rules\u00a0and\u00a0employee education &#8211; phishing attacks are still a very risky attack vector. A new report by LayerX explores the state&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/27\/report-the-dark-side-of-phishing-protection\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Report: The Dark Side of Phishing Protection<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/955"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/956"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}