Employees still falling for phishing scams
30% of users will click on suspicious links, research finds
One third of employees are still likely to fall victim to phishing attacks, risking their company's entire network security, it has been found.
The figures come from Duo Security via one of its free tools, which it launched at the time of RSA conference in March 2016. 11,542 employees across 400 companies were put to the test by their IT teams, which sent out "phishing emails" to see who would fall for the trick. Of those recipients, 31% opened the link contained in the email - behaviour that, were it a real phishing email rather than a dummy one, could cause a data breach at the company they work for.
The fact that only a minority fell for the "scam", with two-thirds of those tested recognising the link as potentially malicious, isn't the point, according to Jordan Wright, R&D engineer at Duo Security.
"At the end of the day, what we see is that just one malicious email is needed for an attack to be successful," Wright told IT Pro. "31% may seem low, but in reality, it is still a lot of people." Indeed, in the case of these results, 31% is 3,578 people - an average of nearly nine per business.
Creating a phishing scam
Duo Security's Duo Insight tool was used by the 400 companies to send out the fake phishing email to their employees.
"We encourage IT administrators to customise the email as much as possible," said Wright, mimicking the targeted attacks often levied at businesses by hackers. This increases the likelihood that a recipient will open the email and click through.
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
That isn't the end of the scam, though. If the landing page then asks for credentials, users may smell a rat and decide to click away, rather than handing over their details. But, while users may think no harm will come to them if they haven't fallen for step two, that may not be the case in reality.
"This is a really big part of security," said Wright. "People think that if they don't enter their details, they are safe, but exploit kits can still download onto the computer without the user entering any information."
The point of this exercise isn't to catch people out or make them feel bad, though.
"The intent is for administrators to do two things. Firstly, to work out their strategies for dealing with potential phishing attacks and secondly to help educate the users," Wright said. This is more than just teaching them not to blindly click on links, but also, for the 59% who do not click, to encourage them to report an incident to IT, helping to nip it in the bud.
Duo Insight can be downloaded free in beta here.
Jane McCallion is ITPro's Managing Editor, specializing in data centers and enterprise IT infrastructure. Before becoming Managing Editor, she held the role of Deputy Editor and, prior to that, Features Editor, managing a pool of freelance and internal writers, while continuing to specialize in enterprise IT infrastructure, and business strategy.
Prior to joining ITPro, Jane was a freelance business journalist writing as both Jane McCallion and Jane Bordenave for titles such as European CEO, World Finance, and Business Excellence Magazine.