Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

The Great Office Return: Correct bad cybersecurity habits picked up while WFH

Employees are returning back to the office. Yay! But, according to new research, they’re bringing bad security behaviors with them.

 

Surprised? Probably not. 56% of IT leaders believe their employees have picked up bad cybersecurity habits while working from home. They also predict a spike in ransomware attacks and targeted phishing scams. So what can you do to prevent these new employee habits from putting your data and systems at risk?

 

Hear how you can transition your workforce securely back to the office from the CPO at MSCI Inc., the Head of Information Security at a NYC-based Investment Management Firm, and an ethical hacker. We’ll discuss:

  • What threats you should be most worried about as employees go “back to work”
  • How to layer further protection where existing tools, like O365, miss threats
  • How to bolster existing defenses to protect against the predicted rise in phishing and ransomware attacks
  • What policies and solutions to double-down on, and which to leave behind
  • How the CISO’s role has evolved over the last year, and how it will continue to expand
The Great Office Return: Correct bad cybersecurity habits picked up while WFH
REGISTER NOW →

Employees are returning back to the office. Yay! But, according to new research, they’re bringing bad security behaviors with them.

 

Surprised? Probably not. 56% of IT leaders believe their employees have picked up bad cybersecurity habits while working from home. They also predict a spike in ransomware attacks and targeted phishing scams. So what can you do to prevent these new employee habits from putting your data and systems at risk?

 

Hear how you can transition your workforce securely back to the office from the CPO at MSCI Inc., the Head of Information Security at a NYC-based Investment Management Firm, and an ethical hacker. We’ll discuss:

  • What threats you should be most worried about as employees go “back to work”
  • How to layer further protection where existing tools, like O365, miss threats
  • How to bolster existing defenses to protect against the predicted rise in phishing and ransomware attacks
  • What policies and solutions to double-down on, and which to leave behind
  • How the CISO’s role has evolved over the last year, and how it will continue to expand