SUBSCRIBE

Let staff go phishing on a simulator

Imagine getting an email from your companyโ€™s human resources department โ€“customized with the companyโ€™s logo โ€“ touting a new benefits program. It even offers a link to check out the details.

Youโ€™d click that link without hesitation.

Cyber attackers are counting on it, because HR didnโ€™t send that link, which has malware at the end of it. So ย how can you tell whatโ€™s legitimate and whatโ€™s not?

Despite increasing numbers of security breaches involving confidential data, security training in Canada is still woefully lacking. IDC says in its December 2012 Forecast of Data Breaches of Personal Information in Canada that there were an estimated 3.3 million incidents of lost or stolen confidential personal data in 2011, and thatโ€™s expected to increase to over 4 million by 2015. Yet only just over half of organizations have actively used employee security awareness plans in place, and, even more disturbing, about one quarter do not even have plans, despite all sizes of organisation listing employee knowledge as one of the top three critical roadblocks to improving security.

Worse yet, IDCโ€™s research finds that IT security investments are lower here than those in the U.S., while Canadians have a higher degree of confidence in IT security. Says IDC, โ€œthis continued high level of confidence is not only unwarranted, but dangerous.โ€

Phishing attacks in which attackers attempt to extract credentials from their victims with communications masquerading as legitimate messages have become increasingly sophisticated. Itโ€™s often difficult for even alert, trained employees to spot them. Targeted phishing, known as spear phishing, aims at a small group of victims, often incorporating customized information to persuade recipients that the emails are from trusted sources.

And thatโ€™s where PhishMe comes in.

Chantilly, VA-based PhishMe Inc.ย is a four year old company that specializes in teaching employees how to detect and avoid phishing, malware, and drive-by attacks. ย Its product is a software-as-a-service ย spear phishing simulator that immerses employees in a realistic scenario without the negative effects of a real attack.

According to CEO Rohyt Belani, (pictured)ย the idea came when he realized humans were becoming the attack vector of choice. The core of his companyโ€™s offerings is managing employeesโ€™ security behaviour. โ€œI shy away from saying we do awareness; thereโ€™s a passive undertone to it,โ€ he says. โ€œActively managing employee behaviour is what we do.โ€

โ€œFighter pilots learn from putting them in the simulator and creating different situations and giving them feedback,โ€ he went on. โ€œThatโ€™s kind of what weโ€™re doing here. We immerse people in a very controlled environment in simulated phishing attacks that closely replicate what the nation-state actors and the cyber criminals do.โ€
RELATED CONTENT

Companies use the service to set up and execute a simulated phishing campaign, and typically touch everyone in their organization every two or three months. If an employee clicks on something he or she shouldnโ€™t, thereโ€™s instant feedback (but not, says Belani, a slap on the wrist โ€“ more โ€œweโ€™re here to help youโ€) and a training snippet of 90 seconds to three minutes. It focuses on one concept at a time. And just so alert employees donโ€™t miss out on the nuances of the training, those who donโ€™t fall for a phish get a congratulatory message and a link to the training material they hadnโ€™t seen.

PhishMe has trained 3.8 million people in 140 countries over the past two years, according to Belani, gathering a massive amount of data about human behaviour as it tracks usersโ€™ progress. Companies track their own employeesโ€™ progress on a dashboard, and can customize their own phishing campaigns.
PhishMe is a subscription based service that charges per user a year. Belani wouldnโ€™t go into detail on pricing, but said an organization with 200 employees could have unlimted campaigns for a year for about US$10,000, including full support. Larger companies would be looking at spending at least US$100,000, with a lower cost per user.

The built-in metrics have shown that overall 58 per cent of users fall for the phishes during early PhishMe campaigns. At the 18 month mark, Belani says the number has fallen to single digits. โ€œItโ€™s risk mitigation,โ€ he says. โ€œAnd itโ€™s a fraction of the cost of a breach response.โ€

PhishMe has now launched a benchmarking feature that lets companies compare their results with those of other customers. Over the next few months, it will be expanded to allow filtering so customers can compare themselves to their peers.

Tech Jobs

Categories