April 21, 2016 By Douglas Bonderud 2 min read

Phishing is a lucrative industry for cybercriminals; even a single successful breach could net big money or millions of compromised records. According to CFO, more refined variants such as spear phishing or whaling, which rely on emails supposedly sent by C-suite executives, have already racked up $2.3 billion and are the subject of a new FBI warning.

Despite the rising number of attacks and jump in potential losses, however, British firm AXELOS reported that good security is hard to find in the U.K. As noted by SecurityWeek, while 99 percent of senior management staff know security awareness training is critical to minimizing impact, less than half are doing more than the bare minimum. The result: phish on the hook. How do companies clear the water?

The Current Cyber Defenses

Companies aren’t going in blind; almost all use some kind of defense mechanism to lower the chances of a successful breach. Among the most popular defenses are tools such as Spamhaus, which captures around 90 percent of all malicious mail. Supplemented with specific phishing lists, it’s possible to get this figure up near 100 percent. But since even one breach can cost millions, near isn’t good enough.

ITProPortal, meanwhile, noted that 82 percent of companies are still using traditional cybersecurity training methods such as computer-based training and e-learning. More than half (54 percent) only require employees to take an annual refresher course and aren’t developing new training in response to emerging threats or the actual risks associated with specific corporate roles. This creates a defense strategy that catches low-hanging fruit but lets truly malicious attacks slip through and wreak havoc.

Changing the Game With Security Awareness Training

So how do companies address the problem of baited hooks and barbed nets in email waters? It starts with a shift in security awareness training.

Rather than using automated defense systems, which take the burden off employees and place it on autonomous processes, companies need to respect the cybercriminal mandate: Enter wherever is easiest. Right now, the easy point of entry is employee email; fool one individual into clicking on a malicious link or downloading a file and attackers get access to the entire network.

One of the best ways to handle this new batch of threats is through the use of simulated phishing attacks. Used by 70 percent of American companies but just 31 percent of their U.K. counterparts, according to SecurityWeek, these simulated phishers are relatively low-cost and provide critical insight into the effectiveness of current security training. If multiple users fall prey to the same tactic, companies can change their overall training strategy.

If specific users aren’t successful, they can receive on-the-spot refreshers in addition to long-term remedial training. As noted by a recent Ponemon report, this type of training typically costs less than $5 per staff member but can offer returns of 20 to 50 times that amount — not a bad deal considering the average cost of a data breach is $3.7 million.

The current slate of security awareness training tools aren’t getting the job done. Companies need to go beyond automated keep-away tactics and actively engage users to identify safe waters and damaging phishing emails.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today