Employees still falling for phishing scams
30% of users will click on suspicious links, research finds
One third of employees are still likely to fall victim to phishing attacks, risking their company's entire network security, it has been found.
The figures come from Duo Security via one of its free tools, which it launched at the time of RSA conference in March 2016. 11,542 employees across 400 companies were put to the test by their IT teams, which sent out "phishing emails" to see who would fall for the trick. Of those recipients, 31% opened the link contained in the email - behaviour that, were it a real phishing email rather than a dummy one, could cause a data breach at the company they work for.
The fact that only a minority fell for the "scam", with two-thirds of those tested recognising the link as potentially malicious, isn't the point, according to Jordan Wright, R&D engineer at Duo Security.
"At the end of the day, what we see is that just one malicious email is needed for an attack to be successful," Wright told IT Pro. "31% may seem low, but in reality, it is still a lot of people." Indeed, in the case of these results, 31% is 3,578 people - an average of nearly nine per business.
Creating a phishing scam
Duo Security's Duo Insight tool was used by the 400 companies to send out the fake phishing email to their employees.
"We encourage IT administrators to customise the email as much as possible," said Wright, mimicking the targeted attacks often levied at businesses by hackers. This increases the likelihood that a recipient will open the email and click through.
That isn't the end of the scam, though. If the landing page then asks for credentials, users may smell a rat and decide to click away, rather than handing over their details. But, while users may think no harm will come to them if they haven't fallen for step two, that may not be the case in reality.
"This is a really big part of security," said Wright. "People think that if they don't enter their details, they are safe, but exploit kits can still download onto the computer without the user entering any information."
The point of this exercise isn't to catch people out or make them feel bad, though.
"The intent is for administrators to do two things. Firstly, to work out their strategies for dealing with potential phishing attacks and secondly to help educate the users," Wright said. This is more than just teaching them not to blindly click on links, but also, for the 59% who do not click, to encourage them to report an incident to IT, helping to nip it in the bud.
Duo Insight can be downloaded free in beta here.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now