Lunch-time Read: Why Phishing Triggers Cyberattacks (via USA TODAY)
![](https://fbexternal-a.akamaihd.net/safe_image.php?d=AQCgnpds80hTRhXN&w=154&h=154&url=http%3A%2F%2Fwww.gannett-cdn.com%2F-mm-%2F2b55b951da4bbd9d4afb4ca89e2ed8c8db2d74b6%2Fc%3D932-0-4672-3744%26r%3Dx203%26c%3D200x200%2Flocal%2F-%2Fmedia%2FUSATODAY%2FGenericImages%2F2013%2F09%2F30%2F1380579340000-sh-Phishing.jpg)
Why phishing triggers cyberattacks
www.usatoday.com
EMBARGO EMBARGEO DO NOT POST PHOTO TO COME Your Secret Cyber Security Weapon by Trevor Hawthorn, Special for USA TODAY (Editor's note: In this guest essay, Trevor Hawthorn, Chief Technology Officer, at
![](https://fbexternal-a.akamaihd.net/safe_image.php?d=AQCgnpds80hTRhXN&w=154&h=154&url=http%3A%2F%2Fwww.gannett-cdn.com%2F-mm-%2F2b55b951da4bbd9d4afb4ca89e2ed8c8db2d74b6%2Fc%3D932-0-4672-3744%26r%3Dx203%26c%3D200x200%2Flocal%2F-%2Fmedia%2FUSATODAY%2FGenericImages%2F2013%2F09%2F30%2F1380579340000-sh-Phishing.jpg)
Why phishing triggers cyberattacks
www.usatoday.com
EMBARGO EMBARGEO DO NOT POST PHOTO TO COME Your Secret Cyber Security Weapon by Trevor Hawthorn, Special for USA TODAY (Editor's note: In this guest essay, Trevor Hawthorn, Chief Technology Officer, at