Phishing Attacks Continue to Rise, Proofpoint Reports
.jpg)
While the volume of phishing attacks grew in 2018, Proofpoint found that there were also several positive trends that helped organizations reduce cyber-security risk.
Phishing remains an active threat vector with the volume of attacks growing, according Proofpoint's 2019 State of the Phish report, released on Jan. 24.
In a phishing attack, a hacker aims to trick a user into clicking on some form of malicious link that is hidden with an email. The study found that in 2018, 83 percent of global infosecurity respondents were impacted by phishing attacks, up from 76 percent in 2017. Targeted phishing attacks known as spear phishing also were on the rise from 53 percent in 2017 up to 64 percent in 2018. Among the key findings in the report was also the simple fact that not all employees within organizations actually understand cyber-security terms and their associated risks. For example, in the U.S., only 65 percent of individuals actually could correctly explain what phishing is.
"Terms like ‘phishing’ and ‘ransomware’ are second nature for security professionals because they are spoken within IT departments each and every day," Amy Baker, vice president of Security Awareness Training Strategy and Development for Proofpoint, told eWEEK. "That is simply not the case for the rest of the organization."
Baker added that for a significant portion of the workforce, employees only encounter security terms during communication with the IT team. She noted that it is critical that infosecurity professionals keep in mind the learning curve associated with cyber-security awareness and ensure that they communicate in a way that employees can understand, process and learn. Awareness of cyber-security terms also varied by age, but with a somewhat non-intuitive result.
"It was surprising that despite being raised on technology from a young age, Millennials were found to be the least cyber-aware, as they fell significantly behind at least one other age group on all cyber-security terminology questions," Baker said. "Baby Boomers, who are often thought of as the least technologically-savvy generation, outperformed all groups in the fundamental understanding of phishing and ransomware."
Phishing Attack Impact
There are several different outcomes that can occur from a successful phishing attack, including loss of data, malware infections and compromised accounts. Baker noted that 65 percent of infosecurity professionals surveyed reported that their organizations dealt with account compromise resulting from a phishing attack in 2018. That figure is an increase from only 38 percent in 2017.
"While we did not ask about business email compromise in this survey, our respondents did share that successful phishing attacks led to a loss of funds," she said. "In addition, the number of organizations that experienced data loss as a result of phishing attacks more than tripled between 2016 and 2018."
Positive Trends
While phishing attacks grew in 2018, there were a number of positive cyber-security trends that the Proofpoint study was able to identify.
Two findings in the report stand out as extremely positive, Baker said. One is that 57 percent of infosecurity professionals have quantified a reduction in phishing susceptibility because of training programs. Another positive finding identified in the study is that 59 percent of suspicious emails reported by end users in 2018 were classified as potential phishing.
"These two findings demonstrate that security awareness training effectively educates employees on the latest cyber-security trends," Baker said.
She added that the positive results also show that security awareness training helps IT teams ensure that employees are prepared to identify malicious emails, reducing the success rates of phishing attacks. Looking forward, Baker is hopeful that training will continue to have an impact in the years ahead.
"We expect to see a continued rise in reported quantifiable reductions in phishing susceptibility, as organizations continue to train their employees and security awareness training vendors continue to enhance their solutions," she said.
source eweek
Latest Jobs
-
- IAM Consultant- OKTA
- Germany
- upto €90,000 plus benefits
-
I am looking for an experienced IAM process Manager to help drive forward a series of IAM implementation for a global Manufacturing business, Ideally you will be skilled with Okta and have knowledge of PAM Solutions, You will be responsible for: Driving the design and continuous improvement of complex IAM solutions in close collaboration with business partners Consult on the optimisation of IAM processes and design proper IT-based solutions to meet availability and quality targets Define technical specifications for SW-development (standards, design patterns, test cases, scenarios) and manage the life cycle of designed solutions Actively scan for relevant innovations and new technologies to identify further potential for improving IAM solutions and processes using OKTA Analyse new features of the regular Okta releases We are looking for someone with strong IAM experience as an Architect, Analyst, Technical Engineer, or similar role in the Identity and Security domain Experience with relevant certifications in development/administration, design and configuration of the Okta IAM platforms Familiar with LCM - joiners, movers, leavers, application federation - SAML, OIDC, SCIM and many other IAM terms Good mix of competences in IAM business process and project management concepts and tools e.g., ServiceNow, Jira, PRINCE2, SCRUM (agile)
-
- SAP Security Consultant
- France
- upto €70,000 plus benefits
-
I am looking for an experienced SAP Security Consultant. The ideal candidate will have a strong understanding of SAP security concepts and be able to apply them to real-world scenarios. ideally you will also have experience with Securitybridge or Onapsis, or a similar SAP security tool. Your responsibilities will include: Reviewing and auditing SAP security settings and controls Identifying and remediating security vulnerabilities Implementing security best practices Educating users on SAP security Experience experience in SAP security Experience with Securitybridge or Onapsis, or a similar SAP security tool would be very advantageous Strong understanding of SAP security concepts Excellent problem-solving and analytical skills Excellent communication and presentation skills Fluent in French & English
-
- Post Grad MSc Cyber security - Junior Cyber Risk Analyst wanted. UK
- United Kingdom
- Entry role
-
The perfect start to your new Cyber Security Career. Post Graduate Cyber Risk Analyst Wanted. Are you are fresh from earning your Cyber Security MSc and eager to start your career in Cyber Security? We are looking for a recent post graduate to join a forward thinking Cyber Security Consultancy for the ideal entry role into Cyber Security. Whilst employed industry experience is not expected, as full training and support will be provided, a history of recent education in Cyber Security / Cyber Risk is essential. We are looking for someone with an inquisitive mind, who is confident to ask the right questions and who isn't afraid to challenge the status quo. Superb communication skills are a must (in person, written and verbal) This is a UK based role that is remote first with monthly travel (1-2 a month) to meet with the team and in time to meet clients. If you aren’t available to travel this isn’t the opportunity. We are unable to provide VISA sponsorship as there will be a requirement to achieve Security clearance If you're adaptable, open to fresh perspectives, and excited to be part of a forward-thinking team and looking for an opportunity to help make a difference in a Cyber consulting role, this opportunity is for you. For more information apply here……
-
- Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared
- London
- OUTSIDE IR35
-
Microsoft Exchange Contractor | London | OUTSIDE IR35 | SC Cleared • We require someone that has experience of migration exchange from windows server 2012 to 2019. • In depth understand of On-Prem exchange server management and deployment. • Experience migrating On-Prem exchange servers from 2012 upwards. • Secure Email Gateway experience essential Due to the nature of the requirement the individual must be commutable to London 2-3 days a week.