Back to Content Hub

How to Find Your Very Attacked People and Protect Them

Sponsored by Graylog

Learn how to identify and defend the individuals in your organization who are most frequently targeted by attackers—and why a people-first detection strategy is key to reducing risk.

Published on Nov 27, 2025
Download Now

Download Now

When you think of your most at-risk people, your mind probably jumps to the usual suspects: your CEO, CFO, or the head of IT. But here’s the thing: attackers don’t care about your org chart. They care about access. And they’re getting more creative in finding the right people to target. Enter the concept of VAPs: Very Attacked People or Very Attacked Persons. It’s not about titles; it’s about who’s actually being attacked. Sure, your executives are likely targets. But what about that marketing director signing vendor contracts? Or the HR manager handling sensitive employee data? Or the facilities coordinator with building access control privileges? These people might not have “CISO” in their title, but they hold the keys to your kingdom, and attackers know it. The 2025 Verizon Data Breach Investigations Report (DBIR) tells us that 74% of breaches involve the human element, including social engineering, phishing, and errors. The days of indiscriminate phishing blasts are over. Attackers are narrowing their sights on specific individuals. They’re tailoring their tactics. And they’re succeeding.
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.