Fake phishing 'quizzes' help companies beat online intruders
High-profile hacks have put companies on the defensive as they try to prevent themselves becoming the next Sony Pictures or Anthem. And data shows phishing emails are increasingly being used as entry points for hackers. Unwittingly clicking on a link in a scam email could unleash malware into a network, or provide other forms of access to cyberthieves.
So a growing number of companies, including Twitter, are giving their workers a pop quiz, testing security awareness by sending spoof phishing emails to see who bites.
"New employees fall for it all the time," says Josh Aberant, postmaster at Twitter, in a data privacy town hall meeting recently in New York.
Falling for the fake scam offers a lesson that businesses hope will ensure employees won't succumb to a real threat. Companies like Wombat Security and PhishMe offer the service for a fee.
Phishing is very effective, according to Verizon's 2014 data breach investigations report, one of the most comprehensive in the industry. Eighteen per cent of users will visit a link in a phishing email that could compromise their data, the report found.
Not only is phishing on the rise, the phish are getting smarter. Criminals are "getting clever about social engineering", says Patrick Peterson, CEO of email security company Agari. As more people wise up to age-old PayPal and bank scams, for example, phishing emails are evolving. You might see a gift card offer or a notice about US President Barack Obama warning you about Ebola.
The phishing tests recognise that many security breaches are the result of human error. A recent study by the nonprofit Online Trust Alliance found that of more than 1,000 breaches in the first half of 2014, 90 per cent were preventable and more than one in four were caused by employees, many by accident.
Fake phishing emails are indistinguishable from the real ones. That's the point. In one sent out by Wombat, the subject reads "Email Account Security Report - Unusual Activity".
The email informs the recipient that his or her account will be locked due to unusual activity such as sending a large number of undeliverable messages.
At the bottom there's a link that, were this a real phishing email, would infect the recipient's computer with malicious software, or steal password and login information.
In the 14 years since PhishMe CEO and co-founder Rohyt Belani has been in the information security field, he says it's changed from something a "geek in the back room" was supposed to take care of to something companies now handle at the highest level of management. The nature of the intruder also has changed, from pranksters to criminal organisations and nation states.
As the security industry developed, he says, so did the idea of the user as "stupid" and the "weakest link", destined to continue to fall for phishing attempts and other scams. Belani disagrees with that, faulting the security industry for not better training workers.
"We posted posters in hallways, gave out squishy balls, and [made] screen savers," he says. "When was the last time you changed your password because of a squishy ball?"
While phishing training emails are a "good cautionary measure", they aren't "actually going to strike at the core of the issue", says Peterson.
Along with large internet companies such as Facebook, Google and Microsoft, Peterson supports establishing a standard that makes it impossible for scammers to impersonate your bank, social network or other business in an email. Think of it as a verification system for emails.
But for now, this seems a long way off. Associated Press