https://www.engineeringnews.co.za

This is (not) a drill

23rd October 2018

     

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

Cofense  (0.05 MB)

How Cofense™ simulations play a key role in preparing your people against the threat of corporate phishing

Over the past few years, phishing attacks that target us at work have grown in sophistication and credibility. While they still pop up every now and then, the days of badly written e-mails claiming to be from long-lost uncles with millions of dollars merely needing to be ‘unlocked’ are mostly gone. While these may have been largely resigned to the scrap heap of internet memes, a far more dangerous genre of phishing has emerged.

Today, we’re seeing corporate domains being compromised, and e-mails being spoofed from company execs, from suppliers, customers and others. Unwitting junior employees receive seemingly legitimate requests from their CFO, demanding they release funds or change bank account details.

HR teams are innocently revealing sensitive personal information based on spoofed requests from their seniors. There are thousands of ways that data and money can be lost – or should we say, ‘stolen’.

Advanced phishing techniques in the corporate world are a dangerous phenomenon, says Anton Jacobsz, managing director of Networks Unlimited, which delivers award-winning Cofense™ phishing defence solutions to the local market. It’s causing many organisations to rethink the way they handle the threat of phishing, and how this fits into their broader cyber-security defences.

“Companies are realising that they can’t simply prevent their employees from using communication tools, social media and e-mail to engage with each other and with other players,” notes Jacobsz. “The goal now is to empower employees with knowledge, helping them become more savvy and aware of the evolving threat landscape.”

Step 1: Baseline assessments

Cofense has developed a tried-and-tested array of solutions that do just this: transforming employees from points of weakness into proactive, vigilant armies that look out for every potential threat. In a recent “Left of Breach” e-book, Cofense helps organisations defend against phishing threats using three key steps.

“We essentially take a three-phase approach,” explains John “Lex” Robinson, anti-phishing strategist at Cofense. “We start with a baseline assessment that seeks to understand your current risk exposure. Where are your current phishing weaknesses, as an organisation? What are you doing today to combat the scourge of phishing attempts by threat actors?

From there, we identify phishing weaknesses in the organisation and then conclude with getting everyone in the organisation, regardless of title or job role, to report real phishing threats to your incident response teams.”

Robinson says that some of the most important aspects of this initial baseline audit include getting a clear view on:

  • Where your most important data is stored;
  • Which individuals and groups have access to this data;
  • What operating systems, e-mail clients and browsers staff are using;
  • Who are the most likely targets of tactics like ‘spear phishing, whaling and spoofing’;
  • Which types of phishing attacks are you experiencing today;
  • Which employees are empowered to send e-mails with customer data or other high-risk, sensitive information;
  • Which corporate systems are able to generate e-mails with customer or sensitive data;
  • What are the social media policies and permissions in place; and
  • How are employees interacting with third party vendors, consultants, contractors, partners and so on?

Answering these questions helps to build a complete picture, which is then overlaid with a deep understanding of the current phishing landscape:

What are the latest corporate phishing tactics? Which companies have recently suffered phishing attacks? What have been the actions of regulators and law enforcement? How are new innovations like blockchain shaping the ‘black market’ for unscrupulous players? What trends are happening specifically in your industry?

Step 2: Starting the simulations

In the second step, you’ll design a series of simulations that serve to mirror real-life attacks. But a word of caution: don’t start the simulations too abruptly. To get a fair assessment, you’ll need to prepare your employees to some extent.

 

Cofense best practices indicate that you should announce the programme and its intentions so your end-users understand the intended outcomes, such as learning to recognise and report real phishing threats. While they don’t need to be notified prior to each simulation being sent, awareness and understanding from your employees are key components to the necessary buy-in to make your phishing defence programme a success. Additionally, you can start spreading phishing awareness messages through company communication channels, advertising the ways that employees can report phishing tactics.

As you move into the simulation, Jacobsz advises IT security teams to try a broad range of different tactics based on what types of real phishing attacks your SOC is seeing happening within your network, which could range from innocent e-greeting cards, to fake invoice attachments, invitations, links to ‘new company policies’, statements from the company on current events, or other attention-grabbing messages.

“Overall, this must be done from the perspective of being constructive and helpful to employees. It shouldn’t become a witch hunting exercise where the employees who fall for the simulations receive any form of disciplinary action. In fact, the individuals who are most vulnerable to threats need to be given special attention and care,” says Jacobsz.

Step 3: Building a sustainable advantage

In the third step, you’re able to start constructing phishing awareness messaging that’s tailored to your users’ needs and to their level of understanding.

Anonymise and publish the results of your simulations; reiterate the ways that employees can report phishing attacks; and conduct further rounds of testing that steadily increase in sophistication.

“It’s important to remember that these simulations fit alongside a number of other interventions, such as learner management tools, incident report management systems and management reports,” Jacobsz explains.

“When used together, they enable CIOs and CSOs to better orchestrate their phishing defence strategies.

“Simulations play a key role in guiding your employees to become more alert to the threat of phishing, business e-mail compromise and related attacks like ransomware. With empowered, knowledgeable staff, organisations can dramatically shorten the time to detect and respond to attacks - helping to reduce the impact and keep the organisation safe,” he concludes.

To learn more about Cofense’s phishing incident solutions, please visit:Cofense.com

 

 

 

 

 

Edited by Creamer Media Reporter

Comments

Latest News

Magazine cover image
Magazine round up | 26 April 2024
Updated 3 hours ago

Showroom

Hanna Instruments Image
Hanna Instruments (Pty) Ltd

We supply customers with practical affordable solutions for their testing needs. Our products include benchtop, portable, in-line process control...

VISIT SHOWROOM 
Weir Minerals Africa and Middle East
Weir Minerals Africa and Middle East

Weir Minerals Europe, Middle East and Africa is a global supplier of excellent minerals solutions, including pumps, valves, hydrocyclones,...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.114 0.17s - 158pq - 2rq
Subscribe Now