Source: Security Boulevard
By: Lisa O’Reilly
Published: September 5, 2019
* Shadow IT and the growth in applications at use in the work environment, together with the Internet of Things (IoT), have led to an increase in entry points that cybercriminals can exploit for phishing and other attacks.
* As bad actors become more sophisticated in their attacks, so too have their success in gaining access to corporate data, financial assets, and networks.