Cybercriminals often employ social engineering techniques to gain access to systems. Despite the rising profile of phishing, 23% of recipients open phishing messages and 11% click on attachments. A failure to control ports and limit services is like leaving a window open for cybercriminals. A Ponemon Institute report found that only 41% of respondents had automated tools to capture intelligence and evaluate the true threat of malware, even though organizations with automated tools can handle 60% of malware containment without human intervention, saving a huge amount of time and resources.”]

