From business email compromise to SIM ports, cyberattacks have shifted from networks to you. And it’s been an incredibly profitable pivot, with cyberhackers like GandCrab claiming earnings of $2.5M per week. How can you protect yourself when the new attack surface is your life and phishing attacks are more sophisticated than ever?  In the never-ending game of cybersecurity cat-and-mouse, what trends are in the good guys’ favor? And how might both software and hardware work together to protect you and your company?

En masse, attackers are moving from these traditional targets of companies and systems and actually are focusing on you.


  • Attacks have shifted from your company’s network to you [0:55]
  • How much it costs to break into a device [2:55]
  • How much it costs to hack you [3:58]
  • Business email compromise (BEC) is a $26B business [4:58]
  • Why BEC victims tend to be small to medium-sized businesses [5:40]
  • Phishing sites have replaced malware sites as the point of access [6:38]
  • Breaking down SIM port attacks (e.g. SIM swapping/jacking) [7:45]
  • One of the largest tech breaches started with photos from a company BBQ [11:00]
  • Enterprise-grade security as consumer products [12:4017]
  • Products and services which help secure against attacks [13:30]
  • Hardware keys for 2FA [15:23]
  • How to set up a detection trap [16:25]
  • Physical security improvements are also being consumerized [18:20]
I worked for the intelligence community from 2001 to 2003. These were the type of attacks that we would see nation-states do to each other. I had no idea that they would start happening down the street. -Martin Casado

Want more a16z Enterprise?

Sign up for news and resources to navigate the world of B2B technology, from AI and data, to security and SaaS, and more.

Thanks for signing up for the a16z Enterprise newsletter

Check your inbox for a welcome note.

MANAGE MY SUBSCRIPTIONS By clicking the Subscribe button, you agree to the Privacy Policy.