Employees still falling for phishing scams

30% of users will click on suspicious links, research finds

One third of employees are still likely to fall victim to phishing attacks, risking their company's entire network security, it has been found.

The figures come from Duo Security via one of its free tools, which it launched at the time of RSA conference in March 2016. 11,542 employees across 400 companies were put to the test by their IT teams, which sent out "phishing emails" to see who would fall for the trick. Of those recipients, 31% opened the link contained in the email - behaviour that, were it a real phishing email rather than a dummy one, could cause a data breach at the company they work for.

Advertisement - Article continues below

The fact that only a minority fell for the "scam", with two-thirds of those tested recognising the link as potentially malicious, isn't the point, according to Jordan Wright, R&D engineer at Duo Security.

"At the end of the day, what we see is that just one malicious email is needed for an attack to be successful," Wright told IT Pro. "31% may seem low, but in reality, it is still a lot of people." Indeed, in the case of these results, 31% is 3,578 people - an average of nearly nine per business.

Advertisement
Advertisement - Article continues below

Creating a phishing scam

Duo Security's Duo Insight tool was used by the 400 companies to send out the fake phishing email to their employees.

"We encourage IT administrators to customise the email as much as possible," said Wright, mimicking the targeted attacks often levied at businesses by hackers. This increases the likelihood that a recipient will open the email and click through.

Advertisement - Article continues below

That isn't the end of the scam, though. If the landing page then asks for credentials, users may smell a rat and decide to click away, rather than handing over their details. But, while users may think no harm will come to them if they haven't fallen for step two, that may not be the case in reality.

"This is a really big part of security," said Wright. "People think that if they don't enter their details, they are safe, but exploit kits can still download onto the computer without the user entering any information."

The point of this exercise isn't to catch people out or make them feel bad, though.

"The intent is for administrators to do two things. Firstly, to work out their strategies for dealing with potential phishing attacks and secondly to help educate the users," Wright said. This is more than just teaching them not to blindly click on links, but also, for the 59% who do not click, to encourage them to report an incident to IT, helping to nip it in the bud.

Duo Insight can be downloaded free in beta here.

Advertisement

Recommended

Visit/security/cyber-security/355185/165-million-britons-experienced-a-cyber-crime-in-the-past-year
cyber security

Report: 16.5 million Britons fell victim to cyber crime in the past year

1 Apr 2020
Visit/cloud/amazon-web-services-aws/355183/aws-launches-amazon-detective
Amazon Web Services (AWS)

AWS launches Amazon Detective for investigating security incidents

1 Apr 2020
Visit/security/privacy/355182/government-to-launch-coronavirus-contact-tracking-app
privacy

UK government to launch coronavirus 'contact tracking' app

1 Apr 2020
Visit/software/video-conferencing/355180/zoom-does-not-use-end-to-end-encrypted
video conferencing

Zoom admits meetings don't use end-to-end encryption

1 Apr 2020

Most Popular

Visit/security/cyber-security/355200/spacex-bans-the-use-of-zoom
cyber security

Elon Musk's SpaceX bans Zoom over security fears

2 Apr 2020
Visit/development/application-programming-interface-api/355192/apple-buys-dark-sky-weather-app-and-leaves
application programming interface (API)

Apple buys Dark Sky weather app and leaves Android users in the cold

1 Apr 2020
Visit/data-insights/data-management/355170/oracle-cloud-courses-are-free-during-coronavirus-lockdown
data management

Oracle cloud courses are free during coronavirus lockdown

31 Mar 2020