New Monitoring Service By PiiQ Media Offers Executive-Level Threat Protection

By Luke Bellos, Editor, TMCnet  |  June 30, 2021

Social media risk analytics firm PiiQ has announced a new threat monitoring service, specifically tailored to protect high-level employees from cybercrimes from multiple locations. 

Cybercrime is on the rise due to the recent shift to hybrid work environments, and many large organizations are working overtime to ensure employees are protected from malicious attacks. Although many cyber attacks involve intricate, highly complicated programs, many users neglect to consider the impact of social engineering. 

"The human layer of corporate information hasn't been given enough attention, yet it's the primary means of corporate compromise,” commented Aaron Barr, CTO, PiiQ Media. “Monitoring for increased risk based on digital conversations, combined with identifying and mitigating unnecessary PII exposures, are the best way to reduce corporate risk.”

With PQ-PROTECT, PiiQ’s latest offering, employees at the executive level can protect sensitive informative, both personal and corporate, through the following strategies:

-Individual executives and high-profile individuals can identify the information that could be used against them in social engineering-based attacks. PQ-PROTECT also helps protect these individuals from increased physical risk by identifying exposed PII that divulges sensitive information.

-Corporate security officers and information security officers who are responsible for protecting corporate information systems are empowered to reduce the exposed PII of employees, which improves corporate security and protection.

-Companies achieve improved oversight of their overall risk exposure by monitoring indicators of compromise (IoCs) to company or executive reputational management.

Barr added, “PQ-PROTECT, along with a more modern and robust security awareness training program, provides the best protection against advanced social engineering attacks.

Advanced security programming and automation can do wonders for ensuring a secure network for business operations, but those features are not without limitations. The most effective strategy for keeping any company safe from exploitation is to use these software solutions in combination with common sense online safety practices.


Edited by Luke Bellos