Phishing Attacks Continue to Rise, Proofpoint Reports
While the volume of phishing attacks grew in 2018, Proofpoint found that there were also several positive trends that helped organizations reduce cyber-security risk.
Phishing remains an active threat vector with the volume of attacks growing, according Proofpoint's 2019 State of the Phish report, released on Jan. 24.
In a phishing attack, a hacker aims to trick a user into clicking on some form of malicious link that is hidden with an email. The study found that in 2018, 83 percent of global infosecurity respondents were impacted by phishing attacks, up from 76 percent in 2017. Targeted phishing attacks known as spear phishing also were on the rise from 53 percent in 2017 up to 64 percent in 2018. Among the key findings in the report was also the simple fact that not all employees within organizations actually understand cyber-security terms and their associated risks. For example, in the U.S., only 65 percent of individuals actually could correctly explain what phishing is.
"Terms like ‘phishing’ and ‘ransomware’ are second nature for security professionals because they are spoken within IT departments each and every day," Amy Baker, vice president of Security Awareness Training Strategy and Development for Proofpoint, told eWEEK. "That is simply not the case for the rest of the organization."
Baker added that for a significant portion of the workforce, employees only encounter security terms during communication with the IT team. She noted that it is critical that infosecurity professionals keep in mind the learning curve associated with cyber-security awareness and ensure that they communicate in a way that employees can understand, process and learn. Awareness of cyber-security terms also varied by age, but with a somewhat non-intuitive result.
"It was surprising that despite being raised on technology from a young age, Millennials were found to be the least cyber-aware, as they fell significantly behind at least one other age group on all cyber-security terminology questions," Baker said. "Baby Boomers, who are often thought of as the least technologically-savvy generation, outperformed all groups in the fundamental understanding of phishing and ransomware."
Phishing Attack Impact
There are several different outcomes that can occur from a successful phishing attack, including loss of data, malware infections and compromised accounts. Baker noted that 65 percent of infosecurity professionals surveyed reported that their organizations dealt with account compromise resulting from a phishing attack in 2018. That figure is an increase from only 38 percent in 2017.
"While we did not ask about business email compromise in this survey, our respondents did share that successful phishing attacks led to a loss of funds," she said. "In addition, the number of organizations that experienced data loss as a result of phishing attacks more than tripled between 2016 and 2018."
While phishing attacks grew in 2018, there were a number of positive cyber-security trends that the Proofpoint study was able to identify.
Two findings in the report stand out as extremely positive, Baker said. One is that 57 percent of infosecurity professionals have quantified a reduction in phishing susceptibility because of training programs. Another positive finding identified in the study is that 59 percent of suspicious emails reported by end users in 2018 were classified as potential phishing.
"These two findings demonstrate that security awareness training effectively educates employees on the latest cyber-security trends," Baker said.
She added that the positive results also show that security awareness training helps IT teams ensure that employees are prepared to identify malicious emails, reducing the success rates of phishing attacks. Looking forward, Baker is hopeful that training will continue to have an impact in the years ahead.
"We expect to see a continued rise in reported quantifiable reductions in phishing susceptibility, as organizations continue to train their employees and security awareness training vendors continue to enhance their solutions," she said.source eweek
- Security Analyst. Financial Services. UK. Permanent
CH7863 Security Analyst. End User . Financial Services Security Analyst needed to monitor and manage a security suite of tools within an End User environment. The Security Analyst will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
- DevSecOps - Security design / review consultant. SC Clearance. London
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.
- Internal Security Auditor, Level 1 Service Provider (ISO27001)
- Upto 55,000 plus benefits
Internal Security Auditor ISO 27001, PCI, needed to join a Cyber team within this expanding Fintech business. The Internal Security Auditor will have end to end responsibility for planning, delivering, remediating any findings etc. Experience working within financial services is highly desirable. This Is a great time to join a newly formed and growing Cyber team within a rapidly expanding fintech, that is taking a major share of its market. We are looking for someone with experience, (but not to be limited to) a mix of Information Security standards, frameworks, audit principles, controls / policies and the management and use of the technical tooling etc. ISO 22301, ISO 27001, NIST Cybersecurity Framework etc An ideal candidate will be working within an end user environment with a cyber consultancy background. Experience taking a company through accreditation is highly desirable Experience managing internal stakeholders, technical teams and external third parties essential Flexible working, but with the ability to get into London. This is an exclusive role to DCL Search & Selection.