Sunday, March 22, 2026

These are the employees most likely to suffer a CYBER-ATTACK

In light of the news that the Labour party experienced a large-scale cyber-attack on their website, Reboot Online Digital Marketing Agency has analysed who is most at risk of cyber-attacks globally using Protecting the People: A quarterly analysis of highly targeted cyber attacks’ by ProofPoint, as well as providing five top tips for avoiding malware and phishing scams when at work.

Predictably, as a group of individuals within departments ‘Lower-level employees’, such as customer service representatives were subject to 67% of highly targeted attacks, with those in marketing, public relations and human resources accounting for nearly 20% of all phishing and malware attacks

‘Contributors’ were found to represent 40% of the most targeted employees within an organisation. Thereafter ‘Management’ (27%), ‘Upper Management’ (27%), and ‘Executive’ employees make up 6% of the most highly targeted emails.

Interestingly, when considering which industries are targeted the most by email fraud, ‘Pharmaceutical drug manufacturers’ came out on top with 71 highly targeted attacks per company over a period of three months, as per the findings of the report, on average. Closely followed by ‘Construction’ with 61 attacks per company and thereafter, ‘Real estate’ with an average of 54 attacks per organisation.

 

Here are five top tips for avoiding malware and phishing scams when at work:

  1. Know what to look for:
    Pay close attention to attachments, advertisements and pop-up alerts, ensuring you only open what you trust. Train users to spot malicious emails and websites by knowing what to look out for.
  2. Avoid unsolicited links and attachments:
    Most commonly, you should know the sender of an email and trust the source it is coming from. If unsure, go with the assumption that it is best to avoid opening emails from an unknown source/sender altogether. And although a lot of companies employ malware scanning features, you shouldn’t be solely reliant on this.
  3. Turn off email HTML:
    Adding HTML can sometimes automatically run malware scripts within an email once it has been opened. For this reason, you may choose to disable it, lowering the risk of an attack.
  4. Scan external drives:
    Many USB and external hard drives can hold malware and spread across the workplace onto other computers. To be extra vigilant, it is recommended that you scan all external devices with anti-virus software each time you connect an external portal to a computer.
  5. Regularly change your password:
    Though this may seem obvious, it is easy to forget to regularly update your passwords or be reluctant to do so in fear of forgetting them. However, for security purposes it is good practice to change your passwords every 90 days.
Reboot Online Digital Marketing Agency.

Latest

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now...

Supply chain risk starts where transparency ends

It’s time for businesses to recognise that scientific integrity...

Learn the hidden behaviours of history’s great strategists

History’s great strategic thinkers prove that strategy isn’t about...

Subscribe To Our Content

Don't miss

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now...

Supply chain risk starts where transparency ends

It’s time for businesses to recognise that scientific integrity...

Learn the hidden behaviours of history’s great strategists

History’s great strategic thinkers prove that strategy isn’t about...

Chainguard achieves 94% Python coverage across customer environments

Chainguard expands coverage and impact across Python, Java, and...

How digital vaults can future-proof enterprises for the AI era

As AI accelerates demand for high-quality, large-scale data, Alex Segeda of Western Digital explores whether enterprises can afford not to preserve their archives strategically AI...

Chainguard Catalog Starter: Build with open source software you can trust

The industry’s largest catalogue of trusted container images now offers free, production-ready images to accelerate secure software development Chainguard, the trusted source for open source,...

Supply chain risk starts where transparency ends

It’s time for businesses to recognise that scientific integrity is critical to ethical supply management, says Rupert Hodges of origin verification pioneers Oritain Today, the...

LEAVE A REPLY

Please enter your comment!
Please enter your name here