Your business runs on communication. Without digital communications, your processes grind to a halt, and your profits dry up.
But what if your communications – the very lifeblood of your company – could be turned into a weapon against you?
That’s phishing.
The word “phishing” was introduced around 1996 by hackers using email communications as a lure to hook unsuspecting AOL users into giving up their account credentials (usernames and passwords).
Today, phishing is still primarily an email-based attack method delivering malware and ransomware. But in recent years, cybercriminal syndicates and lone-wolf hackers have expanded the email phishing ploy into all forms of digital communications, including fraudulent websites, social media direct messaging (DM), and text messaging.
Criminals using a phishing tactic generally send out thousands of fraudulent messages at a time, casting a wide net. Their goal is to get unsuspecting recipients of their message (you and your employees) to open their message and provide confidential data (credit card details, banking information, usernames, passwords, passport numbers, etc.)
Why Do Cybercriminals Still Use Phishing?
Because it works!
A Proofpoint 2021 study determined that 75% of businesses worldwide were targeted by a phishing attack in 2020.
Verizon’s 2020 Data Breach Investigations Report noted that 22% of all successful data breaches in 2020 were related to phishing.
And…it’s a target-rich environment.
According to a study done by Cybersecurity Ventures and Thycotic, there are now more than 300 billion passwords in use worldwide.
Yes, billion with a “B”.
With the world population currently hovering around 7.8 billion, that’s an average of more than 38 passwords per person on earth. This figure doesn’t even account for bank account numbers, social security numbers, passport numbers, etc.
Why Does Phishing Work?
Phishing is effective as an attack method because it plays on human nature.
That’s why phishing works.
Let’s examine how each of these very human tendencies can trap you or your employees in a phishing attack.
People are naturally curious.Employees’ curiosity knows no bounds – especially when they are bored with their work. It’s easy for them to browse the internet, clicking on things that may interest them, even stumbling on a phishing site (a fake website used for gathering your data or getting you to download malware) along the way.
The other side of the “people are curious” angle comes in the form of email attachments. After all, who hasn’t opened an email with a title that says something like, “You gotta see this…”
Much of the browsing risk can be mitigated by a cybersecurity team like PTG through the use of internet traffic filtering at the firewall, and email security measures (such as spam filtering) help prevent phishing emails from landing in your inboxes.
People are naturally trusting of well-known companies and brands.
Spoof emails and websites based on well-known companies and trusted brands is a common ploy of phishing. Often, the URLs of the phishing websites are just one letter off the brand name. “Goigle.com” instead of “Google.com” for instance.
The websites and emails intended to look like they are from a trusted corporation or brand look legit.
So how do you spot them?
Here’s some pointers.
People want to please.
Often, phishing emails are sent out under the name of a company superior or a corporation that millions of people do business with every day. The cybercriminals depend on the fact that you naturally trust the person/company that the email is supposedly from and that you want to comply with the request made in the email.
Phishing emails can be as simple as an email that looks like it’s from your boss, asking for your network login credentials because, “I lost mine.”
Sure, you want to help…but you’re actually helping a criminal gain access to your confidential customer data and proprietary information.
People want to do their work in the simplest and quickest way possible.
The saying is, “Work smarter not harder.”
The problem with that saying is that many times we choose the shortcut…and the shortcut ends up putting us in the wrong place.
For example:
An employee runs into a workflow issue that they believe could be solved with a simple app – if they can find one. So, they search the web looking for “app that will do ____________.” It doesn’t take long for them to find five to ten “free” apps (on websites of varying credibility) claiming to do exactly what they want to do.
There are two problems with this approach.
Phishing – What to Do?
While the PTG team can install multiple layers of cybersecurity around your IT systems and mission-critical data, a simple keystroke from an employee can still put you at risk.
Your employees have to become cybersecure aware and begin to see themselves as your front line of defense against phishing attempts.
To help them understand phishing and other cybersecurity tactics that leverage human nature against us, PTG provides group training, online courses, and testing. Cybersecurity training is a critical weapon in your defense against phishing and the resulting malware and ransomware systems infections.
Want to know more about the PTG anti-phishing cybersecurity training? Give us a call or send an email.