Industry Research : More Than 1 in 4 Workers Unaware of Phishing Threat
Research from PhishMe has uncovered the scale of the phishing problem in UK businesses – with more than a quarter (27%) of office workers not knowing what phishing is, yet more than three quarters (78%) responding said that they had never fallen for a phishing attack. Phishing emails, which are spoofed emails that try to trick recipients into doing something they shouldn’t, let hackers gain access to the corporate network in order to acquire sensitive information such as usernames, passwords or R&D information.
The research, conducted by OnePoll amongst 1,000 office workers across the UK, showed that more than 1 in 5 people admit to having been tricked by a phishing email into clicking a link or opening an attachment, but more worrisome is the 78% that thinks they have never fallen for a phishing email. In PhishMe’s experience of tracking the responses of more than 3.5 million users, around 60% of people will fall for a phish if they have never been trained to recognize the signs of a phishing email.
Scott Greaux, Vice President, Product Management and Services from PhishMe said, "Spear phishing is the criminals’ method of choice if they want to get inside an organisation. They send well-researched emails to a handful of individuals inside companies they want to infiltrate. The emails are designed to get the recipient to react – either by clicking a link, opening an attachment or providing personal information. User education is essential – to change their behaviour and help ensure your employees don’t fall victim."
If phishers want to get inside your company, they can be very imaginative. They might research an individual and learn that they were at an event last week, and send an email saying "It was great to meet you at ABC conference last week, here’s a link to some of the research we covered on the day which might be interesting to you". It’s relevant to the recipient so they might click the link without thinking.
However, trained employees will know to look at the underlying URL, not just the displayed text, to see where it is actually going. They will look at email headers to try to understand if the email address has been spoofed. And they will use common sense – if they don’t remember meeting that person they won’t click on the link. (Likewise, if they didn’t enter a raffle for an iPad, they won’t believe the email that tells them they won!)
Greaux continued, "Effective education needs to be immersive. Mock up phishing emails and send them to your employees, and see what they do. If they click on the link, open the attachment or provide personal data, then provide immediate feedback in the form of training. Repeat the training on a regular basis and you will quickly see that the percentage of people who fall for it will quickly drop."
Today's Tip of the Day - Why Can’t You Take My Call?
More Editorial From PhishMe
Published: Wednesday, January 2, 2013
Genesys® powers 25 billion of the world’s best customer experiences each year. Our success comes from connecting employee and customer conversations on any channel, every day. Over 10,000 companies in...
DialogTech, the combination of Ifbyphone and Mongoose Metrics, provides the only platform for end-to-end call attribution and conversion essential for data-driven marketers. DialogTech''s platform sol...
Semafone provides secure voice transactions for contact centres and retailers taking Cardholder Not Present (CNP) payments. The solution allows a call - and the call recording - to continue as normal ...
|Arise Virtual Solutions|
Arise is a pioneer of on-demand customer management technology and business process outsourcing. Our powerful cloud-based platform provides a virtual nationwide network to connect primarily work-at-ho...