Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

The security industry relies on well-maintained, constantly updating systems to protect its customers from cybersecurity threats. But the security of those systems is often only as good as the ability of humans to identify cyberattacks as they’re happening.

Many employees are vulnerable to security threats due to their lack of knowledge on several cybersecurity issues, according to the results of Proofpoint’s annual Beyond the Phish report. The report analyzed over 130 million responses to cybersecurity questions in order to explore the knowledge of end-users ⁠—otherwise known as normal workers who use their employers’ email and Internet services.

Overall, users answered 22 percent of questions incorrectly. That’s an increase of 4 percent from the last report in 2018, but Proofpoint said its assessment has gotten tougher and more expansive since then.

Respondents had the most trouble with identifying phishing threats, knowing how to protect data throughout its lifecycle, complying with cybersecurity directives like the General Data Protection Regulation (GDPR) and protecting mobile devices and the data stored on them. Users showed the most comfort with avoiding ransomware attacks, answering nearly 90 percent of questions about the topic correctly.

Perhaps due to training sessions and a greater public awareness of malicious threats targeting corporations, the users surveyed by Proofpoint performed best on questions related to identifying potentially risky communication channels, recognizing cyber threats such as ransomware and malicious pop-up windows, and locking their computer before leaving their desk.

But the users had trouble with questions regarding mobile device encryption, protections for personally identifiable information and actions they can take following a potential physical security breach.

“Cyber criminals continue to focus on people, structuring attacks to take advantage of users who are unaware and unprepared,” the report reads. “Not all security incidents are solely the result of an attack; many arise from poor user security practices and a general lack of awareness.”

Professionals in the education and transportation industries had the poorest performance on the assessment, answering questions incorrectly about 24 percent of the time. Users in the finance industry performed best with about 20 percent incorrect answers.

The report also featured statistics on the difference in performance between users as a whole and users who received ongoing security awareness training. The company, which provides such training, found that users performed better on tough questions related to mobile devices and regulation compliance when they received quarterly training.

“Education answers the ‘why’ for users,” the report reads. “It helps them make the connection between awareness and action … Regular security awareness training is the best way to build users’ knowledge.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Brivo, Eagle Eye Networks Merge

    Dean Drako, Chairman of Brivo, the leading global provider of cloud-native access control and smart space technologies, and Founder of Eagle Eye Networks, the global leader in cloud AI video surveillance, today announced the two companies will merge, creating the world’s largest AI cloud-native physical security company. The merged company will operate under the Brivo name and deliver a truly unified cloud-native security platform. Read Now

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.