Without letup the cyberattacks keep coming but they are not necessarily aimed at your network’s protocols or software vulnerabilities — at least, not at first. Instead, they maneuver themselves into part of your corporation’s most vulnerable infrastructure and manipulate your employees to fall for some email message that is not what it appears to be. Knowledge workers encounter these hazards during every working day when they are reading and responding to email.