How attacks exploit people as the weakest link in security

The Human Factor

Published March 2015

Most advanced attacks rely as much on exploiting human flaws as they do system flaws. This report has been developed to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments.

This paper uses original field research to provide insight on who’s clicking, what they’re clicking on, and when, where, and why the weakest link in security is all of us.