Page 14 - Cyber Defense eMagazine - September 2017
P. 14

Even  highly  sophisticated  attackers,  such  as  state  sponsored  actors,  routinely  use  non-
               technological phishing campaigns to gain an initial foothold inside target networks, usually by








































               stealing user login credentials.
               Above  is  a  real  BEC  (business  email  compromise)  phishing  lure  - These  are  also  known  as
               CEO scams


               Phishing Defense
               How, then, can we effectively change the security behaviors of users, particularly when they’re
               performing a standard office task such as checking their email.
               The answer is simple, but not obvious: Phish them yourself.

               Think about it. If you wanted to get better at bird spotting, you’d buy some books, look at the
               pictures, and then… Go out and start trying to identify birds.

               Naturally, if you want your users to get better at identifying phishing emails, the process is much
               the  same.  The  stakes  are  much  higher  than  they  would  be  for  a  casual  hobby,  yes,  but
               nonetheless practice remains the only reliable way of getting better at anything.

               Now of course, you’ll need to provide some training first. You’ll need to explain to your users
               what the program is designed to achieve, why phishing is such a big deal, and what you expect
               from them. Not only that, you’ll need to do all this in a way that gets your users-side; after all,
               the success or failure of your program is largely in their hands.

               Once  all  of  that  is  out  the  way,  though,  it’s  time  to  start  systematically  developing  realistic
               phishing simulations, and sending them to your employees on a regular basis.

                    14   Cyber Defense eMagazine – September 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   9   10   11   12   13   14   15   16   17   18   19