SUBSCRIBE

Phishing awareness training almost futile, say Canadian bank infosec pros

Youโ€™ve trained, warned and threatened staff not to click on suspicious email attachment, and they still do it. Employees seem dense. Even the C-suite fail tests. You think thereโ€™s no hope for them or of stopping staff from falling for phishing.

Congratulations, youโ€™re in good company: Senior security officials at two of the countryโ€™s biggest banks think so too.

โ€œWhat Iโ€™ve learned is you canโ€™t fix stupid,โ€ Manish Khera, director of data protection, security consulting and application security at RBC Capital Markets said Thursday at the SC Congress security conference in Toronto.

Manish Khera, RBC
Manish Khera, RBC

Some employees delete phishing email, he said, but others click and when nothing happens (because the malware is quietly downloading behind the screen) they reply to the sender, who sends another link โ€“ or the staffer forwards the message to their home.

โ€œWe have to get to a place where we are OK with stopping business processes, with breaking things for the safety of our assets and the company,โ€ he said. โ€œUntil we get to that point I donโ€™t think we can win this battle.โ€

Jeff Stark, director of cyber security at CIBC, agreed. โ€œItโ€™s not the end of the world (to briefly delay messages), an email can be re-sent. That would go a long way to help us as security practitioners to put in solutions that actually solve the problem properly instead of weakening our security controls.โ€

Jeff Stark, CIBC
Jeff Stark, CIBC

But he said at previous posts when he told management there could be a five minute delay for some messages that are being scanned โ€œthe business loses their minds.โ€

User awareness training doesnโ€™t work, he added โ€“ in fact he thinks it should be abandoned โ€“ although later organizations should keep it up, but that heโ€™s lost faith in its effectiveness. Stark noted that when he asks employees how they can improve training, the majority say, โ€œโ€™We donโ€™t care. My job is in marketing or finance. We click. Youโ€™re the security guy: Protect me.โ€™โ€

Even Khera admitted thatโ€™s his wifeโ€™s attitude.

RBC does monthly phishing tests and awareness training, Khera said, and tracks click response with some success. But he suggested some people are hopeless โ€“ he gives up on those who click on bad test email six times or more.

Itโ€™s long been known, Stark said that email, โ€œis the best threat vector to get into an organization, and I thought this was or should have been solved many years ago, and it turns out that itโ€™s not. And Iโ€™m still baffled about why weโ€™re still having these discussions.โ€

But also he believes many IT departments arenโ€™t performing basic message hygene, such as deleting executable attachments, or following proper procedures. Thatโ€™s why the increasingly common spoofed CEO email telling a staffer to transfer money isnโ€™t getting caught โ€œYou should never have an inbound message from your own company coming from the Internet,โ€ Stark said.

โ€œTo me the problem has been solved, weโ€™re just not executing properly as security practitioners.โ€

He went further, saying infosec pros havenโ€™t implemented basic security across their entire stacks. Then they add more tools โ€“ which arenโ€™t configured right โ€“ and they wonder why malware still goes through.

When one conference attendee suggested giving employees more time to let awareness training sink in, Khera agreed, but admits it will still take years. But Stark noted security awareness training has been going on for the past 20 years.

All this prompted one attendee to argue that if Stark and Khera, with their large security budgets, see things as hopeless, what hope is there for smaller companies?

They may be better off, Stark suggested. His last job was at virtual bank ING [now owned by Scotiabank], which, with 200 employees, was nimbler than CIBCโ€™s 48,000 workforce spread around the world.

Audience members tossed out a number of possible solutions, including shaming repeat offenders. But, countered Stark, you want end users to trust and work with the security team and call in to report suspicious activity.

But he did say one training tactic heโ€™s tried has had some impact: Deception. Stark has placed a โ€˜Protect your Kids Online,โ€™ slide show on CIBCโ€™s Lunch And Learn program. Itโ€™s voluntary, not mandatory, and while parents pick up tips aimed at their children the message also sinks in to them.

He also urged infosec pros to frame email scanning strategies in financial savings terms: Re-imaging an infected PC, for example might cost $500. Multiply that times the number of devices that have to be remediated each month and it will add up. Cutting into that saves the enterprise money.

โ€œI tell our team weโ€™re not just security people, weโ€™re marketing people and we market what we need to do to executives to get the money we need. You have to be able to sell your solutions to management.โ€

Stark insisted that thorough scanning of email is the solution, although there may be a small price. But, he said, โ€œif we can set the expectation that not every message is going to be delayed five minutes โ€ฆ then you can move forward with the solution.โ€

However, Kherea said technology isnโ€™t the answer. โ€œWe have to make a risk-aware culture such that weโ€™re all responsibleโ€ for security. โ€œWe havenโ€™t done a good job in that.โ€

Asked for commentย Fridayย morning at the Anti-Phishing Working Groupโ€™s eCrime conference in Toronto, association co-founder Peter Cassidy said CISOs have to be persistent and patient with awaremess training.ย He likened it to the continuing fight against smoking, which not only has taken years but the resources of governments.
โ€œYou canโ€™t expect people to be re-programmed after decades of behaviour after one day of (awareness) training.โ€

Tech Jobs

Categories