Preventing Cyberattacks and Data Breaches via Employee Awareness Training and Phishing Simulations

One of the findings in Verizon’s most recent Data Breach Report is that stolen credentials are the root cause of data breaches 80% of the time. The most common attack vector of cyber criminals for stealing user credentials is phishing: A targeted campaign of e-mails designed to fool users into surrendering their network login credentials or opening malicious software. These e-mails simulate legitimate communications that users sometimes see including password resets, surveys, and Excel attachments. Once a user opens a malicious attachment or enters their credentials, the network has most likely been compromised.

While most e-mail filters are very adept at catching these and deleting them prior to reaching a recipient’s inbox, some still make it through. Cyber thieves are continuously honing their tactics and e-mail structure to appear authentic and trick e-mail filters into believing they are real. Once a malicious e-mail reaches a recipient’s inbox, they are one of the last lines of defense.

Many organizations do not have a cybersecurity awareness program in place to ensure that employees and contractors are educated about cybersecurity threats, their role in preventing attacks, and how to recognize a malicious e-mail. Most also do not have measurable data about employee diligence when confronted by a phishing campaign. These two elements are essential to an effective cybersecurity strategy but are often overlooked in preference of traditional preventative security measures (firewalls, anti-virus, vulnerability scans, etc.). Preventative measures, however, can only go so far: Once those layers of defense have been breached (especially by a phishing campaign), employee diligence is all that stands between the hacker and your network.

We highly recommend that organizations perform employee and contractor cybersecurity awareness training, both as part of onboarding and on an annual basis. Additionally, periodic phishing simulations should be performed to assess employee diligence and to further educate them on the risks of opening suspicious e-mails. Schneider Downs offers both of these services and has found them to be highly effective in reducing (or eliminating) malicious e-mail infections. Prior to training we find that users open targeted phishing e-mails at a rate of 15% or greater. Once users have been trained that rate drops to almost zero.

Our technology professionals can help you craft a cybersecurity awareness training program (and deliver it if desired) and assess the security posture of your organization through phishing campaign simulations and network security assessments. Such efforts will go a long way in preventing data breaches. For more information on how to properly manage cybersecurity risks and network security, please contact Chris Debo of Schneider Downs by phone at 614-586-7108.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at [email protected].

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2024 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on
8 Key Considerations When Reviewing User Access
Enhancing Focus on Risk Management and Consumer Protection
The Top Risks Internal Audit Leaders Need to Know for 2024
SOC 2 Terminology: Vendor vs Subservice Organization vs Subcontractor vs Third Party vs Nth Party
Did Poor Change Management Contribute to the AT&T Wireless and McDonald’s Outages?
Register to receive our weekly newsletter with our most recent columns and insights.
Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us
contact us
Pittsburgh

This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.

×