i 1 2 3 4 5 Cracking the Code to Secure Productivity in Two Steps 4 Key security concerns of the modern work era In the face of these dire consequences, IT teams find themselves running up against several key challenges. Verifying identity Attackers use different techniques like phishing, malware, and domain spoofing to capture user credentials. These credentials (passwords, user IDs, emails, etc.) are then used to gain access to company resources, steal data, or compromise accounts. 1,287 Protecting a modern workforce Password attacks occur Many businesses’ work models have undergone rapid changes in recent years, with 12.7% every second.3 5 of full-time employees now working from home and 28.2% using a hybrid model. These employees don’t always take the right precautions to defend against threats, which provides cybercriminals with more exploitable vulnerabilities. Meanwhile, working with outdated 31M hardware and unmanaged devices that aren’t compliant increases IT complexity, leaving Phishing attacks rose to 31 million organizations more vulnerable to attacks. 4 per month in the past year. % % % 80– 90 71 86 Of successful ransomware Of workers are more likely Of security leaders say compromises originate to be infected on an outdated PC hardware 6 7 through unmanaged devices. unmanaged device. leaves organizations more vulnerable.8

Cracking the code to secure productivity - Page 4 Cracking the code to secure productivity Page 3 Page 5