A new study shows that the social engineering attacks along with phishing emails are the #1 attack vector for today’s organizations. This goes for internal networks, cloud environments, and POS systems which are all are very susceptible to this common threat.
According to security vendor Trustwave in their 2020 Global Security Report, the combination of email-based phishing attacks and social engineering are nearly always the #1 attack vector in an average of 50% of incidents, up from 33% the previous year.
Here’s the numbers:
If that wasn’t bad enough, according to Trustwave, the median number of days between intrusion and detection is nearly 3 months (85 days) if detected externally (e.g., if data is breached, utilized, and tracked back to the breach) and still 8.5 days if detected internally by security solutions.
The study reports that the absence of users participating in identify and stopping malicious emails by not engaging with them is a big part of the problem:
“It is clear the human component of security, with the rank and file being aware of social engineering tactics, and how to combat them, is lagging.”
To face this issue, businesses need to employ security awareness training that instructs users on the widespread presence of phishing campaigns, the tactics used in social engineering scams, and the importance of their role in organizational security.
If you need help with employee awareness security training let contact Darkhound for more information at [email protected].
Image Source: https://www.pexels.com/photo/woman-typing-writing-programming-7112/