Story image

Which department is most vulnerable to phishing?

19 Jul 2016

Data collected on a global scale has proven that the management department in a company is more vulnerable to phishing - over any other department.

IronScales, a leader in phishing mitigation technology, collected data from over 100 different organisations and an array of different sectors like finance, banking, telco and more.

These numbers reflect their performance in the first simulated phishing attack, including the average click rate:

  1. Management (60%)
  2. Finance (56%)
  3. Sales (52%)
  4. HR (47%)
  5. Business Development (46%)
  6. R&D and QA (42%)
  7. Technical Support and Customer Services (41%)
  8. Infrastructure (36%)
  9. Legal (34%)
  10. Operations (32%)

IronScales state that the aim is to create awareness and proactive behaviour in employees, and emphasise that everyone has a stake in intercepting phishing attacks.

Eyal Benishti, CEO of IronScales, says that even he was taken aback by the number the company found.

“There have been some notorious phishing attacks, but the criminals have become very clever about how they disguise their malware, often behind official-looking messages. They’ve developed such sophisticated tools that they continue to fool people at the top, but IronScales is here to stanch the phishing tide,” says Benishti.

According to IronScales, once an attack is detected and the alarm is triggered, the company’s forensics are automatically executed.

Multi AV, sandbox scan, and other exclusive analyses are performed against all of the bad stuff:

  • Ransomware
  • Malware
  • Bots
  • Spam
  • Spoofing
  • Pharming
  • General phishing attacks.

“Various factors that influence the results, such as the volume of email a particular employee deals with on a given day or how used they are to handling request from outside of the organisation,” adds Benishti.

“However, regardless of who, what and where, IronScales solutions reduce the impact of cyber crime on the bottom line.”

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.