Phishing Isn’t Going Away. Here’s How to Not Fall Prey. (2024)

4min. read

Phishing attacks remain in the news. ZDNet reported last week that a prolific phishing operation—which already had a list of 50,000 CEOs, CFOs and other high-level executives—has expanded with a new database of additional targets.

Separately, the UK’s 2019 Cyber Breaches Security Survey revealed that phishing remains the country’s top cybersecurity threat, cited by 80% of businesses and 81% of charities.

It has been more than 20 years since phishing became part of our collective consciousness. Adversaries still use a variety of techniques, including:

  • An embedded link in an email or tricking an employee to go to an unsecure web site that requests sensitive information.
  • Spoofing the sender address in an email to appear as a reputable source and request sensitive information.
  • Installing a malware via a malicious email attachment or ad, which will allow the intruder to exploit loopholes and obtain sensitive information.
  • Attempting to obtain company information over the phone by impersonating a known company vendor or IT department.

Typically, if an attack method has been around for two decades, we would have figured out how to stop or minimize it. The fact that phishing remains a huge threat is attributable to several factors:

  • Phishing still works. People still open emails or attachments that they shouldn’t and sometimes it only takes one mistake to create a huge breach. According to the Verizon 2018 Data Breach Investigations Report, 4% of the targets of any given phishing campaign will click it.
  • Attacks are more sophisticated. Adversaries are constantly upping their game, using social engineering and other methods to make their emails appear more legitimate than ever.
  • Businesses are more vulnerable.Business email compromise (BEC) attacks are rising. Between October 2013 and May 2018 the FBI reported losses and potential losses of more than $12 billion globally due to BEC and email account compromise attacks.
  • Automation. It is simpler and less expensive for adversaries to launch massive attacks, using automation and inexpensive tools via cloud computing and the dark web. Why take a targeted approach when a shotgun is so easily available?

Because many of today’s attacks do such a good job mimicking legitimate emails, you can’t count on technology alone to prevent every malicious email from getting through to a potential victim. But you can limit your vulnerability by investing in technologies such as spam filters and web filters and focusing on these four key areas:

  • Awareness.You have to make people aware that these threats are out there, they are real and they can cause significant harm to your organization. With the rise of BEC attacks, people in finance are particularly vulnerable.
  • Education and training.Once you’ve raised awareness, you have to follow up with education and training. Ensure employees look at language, grammar, spelling, logos, etc. Teach them to be wary of emails that require urgent action. There are many ways to prepare employees; training should be ongoing and mandatory.
  • New processes.If business processes are leaving you vulnerable, change them. For example, when you walk into a bank you can’t just take out a large amount of money without having an officer or manager approve it. With email, the person receiving the email should not be the person releasing the money. Also, train your people to call suppliers and verify by phone whey they are asked for a payment that is in any way suspicious.
  • Corporate culture.Awareness, training and instituting safer processes are part of building a corporate culture focused on cybersecurity and mitigating risk. It’s important for business leaders to remember and remind their people that everyone is responsible for cybersecurity, and everyone has a part to play.

The fundamental techniques used in phishing attacks haven’t changed in more than two decades. Phishing is still about getting people to do things that seem legitimate but aren’t. Modern technology can limit vulnerabilities, but organizations must still account for the people element.

The more you can do to shape your corporate culture around cybersecurity awareness, education and training, the better prepared your people will be to avoid clicking on the wrong link or opening malicious attachment. Phishing may never go out of season, but with the right approach you can minimize the risk that your organization will ever get hooked.

Sean Duca is Vice President, Regional Chief Security Officer, Asia Pacific and Japan, for Palo Alto Networks.

Phishing Isn’t Going Away. Here’s How to Not Fall Prey. (2024)

FAQs

How not to fall for phishing? ›

Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site.

How do people fall prey to phishing? ›

Here are some of the most common ways hackers phish: Email: Many people become phishing victims through malicious emails. These usually appear legitimate, purporting to come from websites that the user has an account with, but are in fact, sent by the hacker to capture personal data.

Will phishing ever go away? ›

Phishing may never go out of season, but with the right approach you can minimize the risk that your organization will ever get hooked.

Why do people still fall for phishing? ›

Many users lack knowledge of phishing tactics and how to identify them. The study states that “people feel a sense of security” when an email has “auxiliary security content like if it says “it has been scanned by an external scanning tool,” even if they do not understand the role of a scanning tool.

What is the greatest defense against phishing? ›

Protect your accounts with effective authentication and authorisation. Passwords are a key target for attackers, particularly if they are for accounts with privileges such as access to sensitive information, handling financial assets, or administering IT systems.

Can you be fired for falling for phishing? ›

Employees recognize that a mistake of this magnitude could easily result in the termination of employment. Maybe the incident doesn't involve the transfer of funds but it's simply a scenario that involves an employee who fell for a phishing email and he/she clicked the link.

Who are typical victims of phishing? ›

Millennials and Gen-Z internet users (18-40 year olds) are most likely to fall victim to phishing attacks – 23% compared to 19% of Generation X internet users (41-55 year olds). 90% of phishing attacks sent via messaging apps are sent through WhatsApp. The next highest percentage is Telegram, with 5.04%.

Who is most targeted by phishing attacks? ›

Phishing Attack Trends

In the second quarter of 2023, over 23% of phishing attacks around the world aimed at financial institutions. Close behind, social media platforms were targeted by about 22.3% of phishing attempts. Similarly, web-based software services and webmail also accounted for 22.3% of the attacks.

Why am I targeted by phishing? ›

Targeted phishing attacks succeed by using information gleaned from social websites and other sources to create a sense of familiarity. These phishing email scams may mention a mutual friend, cite a recent purchase or include information that appears to be a trusted source.

What is being done to stop phishing? ›

Use email security protocols.

Email authentication methods like SPF, DKIM, and DMARC records help verify the source of an email. Domain owners can configure these records to make it difficult for attackers to impersonate their domains in a domain spoofing attack.

What is the jail time for phishing? ›

Potential Penalties for Phishing

The possible punishments include up to 1 year in jail or 16 months or 2 or 3 years in prison. The court may also impose a fine.

Should I be worried about phishing? ›

Any email that asks for your personal or sensitive information should be seriously scoured and not trusted. Even if the email has official logos or text or even links to a legitimate website, it could easily be fraudulent. Never give out your personal information.

What is emotional manipulation used by phishers? ›

The fear of missing out (FOMO) can drive individuals to click on links without considering the potential risks. Fear, another powerful emotion, is often exploited by sending alarming messages claiming that the recipient's security has been breached, instilling a sense of panic and urgency to resolve the supposed issue.

What is the psychology behind phishing? ›

The Psychological Factors of a Successful Phishing Attack

There tends to be 5 primary psychological factors that tends to get us to click links without processing all of the information : fear, stress, over confidence, authority and greed.

Why do phishers pretend to be authority figures? ›

This is typically achieved through fraudulent communication, most commonly via email, where the attacker pretends to be someone else, often an authoritative figure or well-known company. The goal is to manipulate users into giving up their data or clicking on malicious links or attachments.

How do I stop receiving phishing? ›

11 Ways To Stop Spam Emails From Taking Over Your Inbox
  1. Block spam email addresses.
  2. Use an email alias for new accounts.
  3. Report suspicious emails as spam.
  4. Remove email addresses from data broker lists.
  5. Spot the signs of a phishing email.
  6. Unsubscribe from unwanted mailing lists.
  7. Turn off “auto-load” for images.

What is one way to avoid being phished? ›

Do not click on links in emails, and never go to websites by clicking links in emails. This is because such a link may direct you to a fraudulent website. Instead, if you frequently visit the website the phisher is mimicking, always type the correct URL directly into your browser, or use a bookmark to access it.

How phishing attacks can be prevented? ›

Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker. Both desktop firewalls and network firewalls, when used together, can bolster your security and reduce the chances of a hacker infiltrating your environment.

Top Articles
How to Get Ready for a 5K in 2 Weeks
What Is the Most Secure Hashing Algorithm?
Why Are Fuel Leaks A Problem Aceable
Access-A-Ride – ACCESS NYC
Sandrail Options and Accessories
Ross Dress For Less Hiring Near Me
Klustron 9
Mylaheychart Login
Gunshots, panic and then fury - BBC correspondent's account of Trump shooting
Mr Tire Rockland Maine
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Myunlb
R Tiktoksweets
Erin Kate Dolan Twitter
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Hartland Liquidation Oconomowoc
2021 Lexus IS for sale - Richardson, TX - craigslist
Used Drum Kits Ebay
10-Day Weather Forecast for Florence, AL - The Weather Channel | weather.com
Napa Autocare Locator
Mccain Agportal
Sulfur - Element information, properties and uses
Ivegore Machete Mutolation
Aes Salt Lake City Showdown
Like Some Annoyed Drivers Wsj Crossword
Crossword Help - Find Missing Letters & Solve Clues
Pioneer Library Overdrive
Walgreens On Bingle And Long Point
Accuradio Unblocked
Cfv Mychart
Scott Surratt Salary
Ice Dodo Unblocked 76
Downloahub
Blush Bootcamp Olathe
New York Rangers Hfboards
Crystal Mcbooty
The disadvantages of patient portals
Mckinley rugzak - Mode accessoires kopen? Ruime keuze
Compare Plans and Pricing - MEGA
Barber Gym Quantico Hours
Sunrise Garden Beach Resort - Select Hurghada günstig buchen | billareisen.at
Craigslist Lakeside Az
Andrew Lee Torres
Unitedhealthcare Community Plan Eye Doctors
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Atu Bookstore Ozark
Craigslist Pet Phoenix
Ups Customer Center Locations
Turok: Dinosaur Hunter
Gelato 47 Allbud
Otter Bustr
Lake County Fl Trash Pickup Schedule
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 5701

Rating: 4.4 / 5 (65 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.