November 12, 2019 By Michelle Greenlee 4 min read

Phishing remains one of the top threats to enterprise IT. According to a recent Akamai report, “Phishing Is No Longer Just Email: It’s Social,” phishing is responsible for as many as 93 percent of security breaches. Email phishing attacks continue to rank highest among attack methods, but criminals are now adopting modern communication and collaboration tools and services as well.

The Evolution of Phishing

Typical phishing attacks are carried out via legitimate-looking emails. The subject lines and content vary, but the messages generally urge the victim to take action to avoid or gain something. Over time, phishing attack trends have changed, and phishing emails often aim to impersonate legitimate brand mailings.

Modern day phishing attacks target a wide range of communication and productivity apps and services. For instance, some attackers utilize popular social networking and cloud-based services, ensnaring victims across devices at work and at home. New attack methods rely on implied trust, where the victim is familiar with the platform and regularly accesses it.

Phishing attack trends now include attacks on popular cloud-based collaboration and file-sharing services. As the Akamai report noted, “Facebook, Slack, Microsoft Teams, Dropbox, Google Docs, and other popular platforms are serving as the criminals’ initial point of penetration into the enterprise.” No service is immune from attack.

Online games are also increasingly being targeted by phishing scams. Fortnite: Battle Royal, a popular cross-platform game, made headlines in 2018 after a rash of phishing scams were reported. Young players were targeted online by enticing offers of free V-bucks, Fortnite’s in-game currency. Victims were lured in by phishing sites that requested game login credentials, and younger players unfamiliar with phishing were tricked into providing personal information. A whopping 86 percent of these phishing attacks originated on social media sites.

Cybercrime as a service, cybercrime through a kit and cybercrime through a turn-key operation are evolving as well. Phishing kits are available for sale that contain phishing campaign templates and access to a compromised server, among other tools. Some kits are available for free and allow the kit creator to retain access to victim data from every set up. Off-the-shelf packages like these make it easier for criminals to launch new attack campaigns quickly.

Additionally, phishing attack trends are moving toward a more human-centric approach. Attacking technology is a less enticing prospect than gaining direct access using valid credentials. As such, employees must be the first line of defense against phishing attacks.

How to Fend Off Enterprise Phishing Attacks

Build a Robust Cybersecurity Awareness Training Program

Employees who participate in ongoing security awareness training programs can learn to spot phishing tactics. A program that runs for a short time naturally isn’t as effective as a consistent program that provides updated information on current trends and cybersecurity advice. Training users to identify phishing attacks can also have a positive effect on overall security.

Security awareness training programs must be managed by someone. According to the “2019 SANS Security Awareness Report,” effective cybersecurity programs tend to have full-time employees dedicated to awareness training and developing outreach programs within their organizations. Organizations without dedicated, full-time staff to manage awareness programs tend to have less mature awareness programs.

Conduct Simulated Phishing Attack Tests and Measure the Results

Simulated phishing attack tests can help a security team gauge the effectiveness of security awareness training programs and help end users gain a better understanding of attacks. Regular tests that mimic real-life phishing attacks should be conducted even as employees become more skilled at spotting suspicious messages. The threat landscape continues to evolve, and so should your cyberattack simulations.

Detect Potential Threats With Artificial Intelligence, Machine Learning

Use artificial intelligence (AI) to analyze user behavior and detect threats quickly. AI and machine learning can notice troubling patterns in unstructured data and provide security teams with the actionable data they need to respond quickly. Machine learning is especially well-suited to sniffing out vulnerabilities that could elude human security team members.

Deploy Ahead-of-Threat Attack-Prevention Tools

Phishing attacks require a number of systems to function. Ahead-of-threat prevention includes tracking DNS and domain registrations along with other data and can help thwart future attacks by proactively blocking suspicious requests and URLs before they can deliver their malicious payloads.

Make Use of Endpoint Monitoring and Protection

The increasing use of personal devices at work introduces a number of new endpoints that are not fully protected under IT security systems. Monitoring endpoints and providing rapid remediation for compromised devices can prevent the proliferation of an attack originating from one of these unmanaged devices.

Limit User Access to High-Value Systems and Data

Most phishing attack methods aim to exploit human operators, and privileged user accounts are attractive targets for cybercriminals. Limiting access to systems and data can help protect high-value data from compromise. Only users who absolutely need access should have it.

Analyze User Behavior to Spot Trouble Before it Begins

Insider threats — unwitting or intentional — continue to threaten enterprise security. It can be helpful to monitor user behavior for risk and analyze against a typical baseline to detect insider threats and other potentially damaging user behavior. Behavior analytics can also help identify compromised accounts easily, which can enable security teams to remediate quickly.

Protecting against ever-evolving phishing attacks requires a robust security awareness training program for system users and a little help from new technologies like artificial intelligence and ahead-of-threat detection. Ensuring employees are well-trained and regularly tested can keep your first line of defense ready to identify and avoid phishing attacks.

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today