Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

The security industry relies on well-maintained, constantly updating systems to protect its customers from cybersecurity threats. But the security of those systems is often only as good as the ability of humans to identify cyberattacks as they’re happening.

Many employees are vulnerable to security threats due to their lack of knowledge on several cybersecurity issues, according to the results of Proofpoint’s annual Beyond the Phish report. The report analyzed over 130 million responses to cybersecurity questions in order to explore the knowledge of end-users ⁠—otherwise known as normal workers who use their employers’ email and Internet services.

Overall, users answered 22 percent of questions incorrectly. That’s an increase of 4 percent from the last report in 2018, but Proofpoint said its assessment has gotten tougher and more expansive since then.

Respondents had the most trouble with identifying phishing threats, knowing how to protect data throughout its lifecycle, complying with cybersecurity directives like the General Data Protection Regulation (GDPR) and protecting mobile devices and the data stored on them. Users showed the most comfort with avoiding ransomware attacks, answering nearly 90 percent of questions about the topic correctly.

Perhaps due to training sessions and a greater public awareness of malicious threats targeting corporations, the users surveyed by Proofpoint performed best on questions related to identifying potentially risky communication channels, recognizing cyber threats such as ransomware and malicious pop-up windows, and locking their computer before leaving their desk.

But the users had trouble with questions regarding mobile device encryption, protections for personally identifiable information and actions they can take following a potential physical security breach.

“Cyber criminals continue to focus on people, structuring attacks to take advantage of users who are unaware and unprepared,” the report reads. “Not all security incidents are solely the result of an attack; many arise from poor user security practices and a general lack of awareness.”

Professionals in the education and transportation industries had the poorest performance on the assessment, answering questions incorrectly about 24 percent of the time. Users in the finance industry performed best with about 20 percent incorrect answers.

The report also featured statistics on the difference in performance between users as a whole and users who received ongoing security awareness training. The company, which provides such training, found that users performed better on tough questions related to mobile devices and regulation compliance when they received quarterly training.

“Education answers the ‘why’ for users,” the report reads. “It helps them make the connection between awareness and action … Regular security awareness training is the best way to build users’ knowledge.”

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.