The hack

Meet Peter

Peter’s new. He’s been here three days, and can just about remember everyone’s name.

The HR manager told Peter to look out for an email to view his payslips online.

10:03

Peter receives an email to access his online account

10:04

Clicks links and enters credentials

10:11

Cybercriminal harvests credentials

10:13

Account takeover

The impact

  • Total cost: $8.6m
  • Top five clients churn
  • Brand reputation is severely damaged

Once in, our cybercriminals move fast. By 11:10, a spoofed phishing email has been sent to 3,000 customers of Peter’s new company. By 11:20, the company’s help desk start receiving calls from concerned client. The CISO is informed of the hack, and the Risk and Compliance teams begin the investigation and clean-up operation. Peter is made aware of his mistake. The hack hits the headlines two days later…

Why do people get hacked?

Find out now

Get the experts’ opinions

Research paper:

Are people your greatest defense or your biggest risk?

Read the latest industry research to find out.

Read now
Webinar:

Why do people cause data breaches?

Join our live webinar with Lisa Forte for a deep dive into the psychology behind insider data breaches.

Sign up today