Phishing scams are a serious threat to an organization, and they’re increasing in scope, complexity and number – but that doesn’t mean you’re helpless to defend yourself. In fact, it’s easier than ever to proactively protect your organization from threats by following some simple tips.
Phishing Scams on the Rise
According to Wombat Security’s 2019 State of Phish survey, 83% of survey respondents said they experienced a phishing attack in 2018 and 95% of respondents said the rate of phishing scams either increased or stayed consistent throughout the year.
With the threat of phishing scams on the rise and showing no sign of stopping, there has never been a better time to review your organization’s policies and remind yourself how you can stop an attack.
Types of Phishing Scams
Deceptive phishing: The most common phishing scam and the type most people think of when they heard the word “phishing.” Deceptive phishing strikes victims by taking over a recognized email address (or impersonating a recognized one) to get access to information. These emails typically request that you:
- Make a payment
- Re-enter information, such as logins or passwords
- Request that you change your password
- Verify account information
Spear phishing: In recent years, spear phishing attacks have been on the rise. A more sophisticated form of deceptive phishing, spear phishing is a personalized attack that tricks you into thinking you have a relationship with the sender by utilizing full names, position information, addresses, phone numbers or other semi-private information. Once the URL in a spear phishing email is clicked, hackers have access to your account.
Whaling: As the name implies, whaling is a form of phishing that targets the big game. With whaling, also known as CEO Fraud, hackers target and attempt to gain access to executive or director information to access their email accounts. Unfortunately, this kind of attack can be the most successful form of a phishing scam, as executives often don’t undergo the same security training as lower employees.
Phishing calls: Web-based attacks are the most common form of phishing scams, but phone-based phishing scams have increased over the last few years. In these scams, phishers call and attempt to present themselves as a legitimate organization, such as your bank or credit card company to gain information. Typically, the calls begin by volunteering easily-researched information like your name or address to build trust. From there, phishers will drill down further by asking personal information such as passwords or bank account numbers for “verification purposes.”
Know That Protection is Everyone’s Responsibility
While phishing prevention is often laid at the feet of the IT department, protecting the organization from phishing attacks is a responsibility of every member at every level – from interns to IT to the executives. And while you might think your organization has to focus on training for older employees, a survey by Censuswide for Datapac found that millennials (17%) were more likely to fall for phishing scams than Gen X (6%) or Baby Boomers (7%).
Before you shrug off responsibly, know that 42% of business owners to the 2019 State of Phish survey report enforcing ramifications for users who continually click on simulated phishing attacks, and 39% of those respondents say these consequences have made a difference.
Be Wary of Suspicious Emails
Most organizations employ copywriters, editors and/or digital marketers to carefully craft marketing emails, so any email from a brand or company that is riddled with typos and errors should raise red flags. Cybercriminals often make mistakes in emails – sometimes intentionally to slip past your email’s spam filters. Another telltale sign of a suspicious email is one featuring an impersonal greeting, such as “Dear Customer.”
If you don’t know the entity sending the email, don’t interact with the message by clicking links, downloading files or opening attachments. Doing so could open your computer, and your organization’s servers, up to a data breach.
Finally, look closely at the address. Phishing hackers often create addresses similar to ones you might be familiar with to mimic someone else – and if you don’t take a closer look at the sender, you might fall for it. For instance, the CEO of an organization might have the email john.smith@ABC.com, but phishers will employ an address named johnsmith@ABC.com or john.smith@A8C.com to mimic the CEO in an effort to steal data or money.
Stay Updated on Phishing Attacks
Like any kind of scammer, phishers are playing a massive game of cat-and-mouse. As soon as a new technique is deployed or successful utilized, word spreads and the public is educated – forcing hackers to develop new tricks constantly. If you’re not staying updated on new techniques and developments or undergoing security awareness training regularly, you’re easy prey for a phishing scam.
Undergo Penetration Tests
Penetration tests are a great way to test your information security posture by simulating a phishing attack. Designed to test the information security of the technologies and systems in place at an organization, penetration testing identifies specific vulnerabilities before the bad guys do, mitigating the risk of a data breach or phishing scam.
How A-LIGN Can Help
At A-LIGN, our penetration testers emulate the techniques of hackers by developing scenarios and strategies to breach your organization’s information systems, attacking your networks and applications. A-LIGN’s penetration test encompasses:
- Network Layer Testing
- Mobile Application Testing
- Web Application Testing
- Wireless Network Testing
- Social Engineering
Is your organization looking to undergo a penetration test and protect your organization from phishing scams? Contact the professionals at A-LIGN at info@a-lign or 888-702-5446 to find out how we can help.