GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

Phishing Attacks Work Because… Humans

globalresearchsyndicate by globalresearchsyndicate
March 12, 2020
in Data Collection
0
Phishing Attacks Work Because… Humans
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter

If the definition of insanity is repeating the same mistakes and expecting different results, then the definition of phishing is preying on human behavior.

Despite its well-documented history and maturity as a cyber-attack, phishing remains one of the leading methods that attackers use to target enterprise users and infiltrate the workplace. Phishing exploits still work because hackers require only a small percentage of conversions to achieve the goal of acquiring user credentials are studying their targets and employing new techniques to get past email content security filters. Why does phishing continue to haunt security professionals and what can be done to reduce or mitigate the loss of sensitive data?

See Related: Email Phishing Overshadows Risk Of Mobile Malware

Phishing’s Impact On Human Behavior

In the early days of phishing, the patterns used to simulate a real business request were not understood. In fact, the workforce used to be the first line of defense for escalating potential phishing campaigns to IT.

As phishing attacks became harder to distinguish and cyber awareness training increased, the pressure on the workforce shifted. The shift is significant enough to see the ripple effect that phishing has on workforce productivity.

Simply put, people want to do their job. And in many jobs, there is a need to click on links and open attachments. Phishing preys on human behavior by disrupting employee workflow. The authenticity of the sender, the contents of an email message and the requested action all come into question.

Compounding this challenge is the employee belief that the workplace offers a more secure experience than at home because there is a security team present and actively taking steps to protect them.

Some observe that the impact of phishing has removed part of the trust with the employer. Awareness training to overcome human behavior could be nearly impossible to achieve for every organization. A new approach is needed to align the organization’s security posture with the productivity expectations of the workforce.

See Related: The Role Of Human Factors In Enterprise Cyber Security

The Psychology Behind Phishing Requires A Layered Response

“Phishers often use psychological tricks to get users to take action that they might not usually take, preying on an employee’s desire to be helpful or their instinct to do what an authority figure tells them to do,” said Forrester VP and Research Director Joseph Blankenship.

Training alone can’t protect you from phishing. Phishing prevention requires a layered approach that combines technical controls and user education. Each layer in this strategy acts as a safety net in case the layer on top of it fails. The Forrester cyber security analysts define these layers as:

  • Implementing technical controls to protect end users. Shift the first line of defense you’re your workforce with email security solutions, including email content filtering, email authentication, and threat intelligence.
  • Educating your workforce to recognize phishing attempts. Ensure that you implement ongoing training, have mechanisms for reporting phishing, and test and measure performance. Just like InfoSec professional avoid being the security police, be careful not to shame users who fall victim to these attacks. Shaming makes users less likely to report phishing attempts and less likely to complete their training.
  • Planning for technical and human failure. Despite your best technical and educational efforts, your users will be successfully phished. If all else fails, you need to be ready to respond to incidents to limit the impact of a successful phishing attack. Technologies such as browser isolation and MFA can help limit impact. Having an incident response plan ready ahead of time helps the quality and speed of your recovery.

See Related: Enabling Cyber Security Defenders To Design Effective Solution Strategies

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Toddler Chair Market Report Covering Products, Financial Information, Developments, SWOT Analysis And Strategies Employed By Global Top Companies

Facade Sandwich Panels Market Entry Strategies, Countermeasures of Economic Impact and Marketing Channels to 2026 – Daily Science

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com