SBN The Best Anti-Phishing Approach?

Phishing attacks have quickly become the number one threat to IT security. According to APWG’s Phishing Activity Trends Report for Q1 2020, phishing attacks rose at a magnitude that hasn’t been seen since 2016. With our increased reliance on technology due to remote working, hackers use phishing attempts to expose weaknesses in organizational security.

Securing employees’ identities is a crucial imperative for current and future business success. Yet, the industry has largely failed to provide comprehensive solutions to prevent phishing and identity theft. Of course, that leaves IT administrators at a loss, wondering if there is a truly effective anti-phishing approach for their organizations.

Let’s start with what most organizations use to prevent phishing and how it could be better.

Where Traditional Anti-Phishing Falls Short

Traditional anti-phishing approaches consist of several combined methods to combat attacks. An anti-phishing vendor will typically:

  • Send mail through filters,
  • Extensively train end-users to spot phishing attempts, and/or
  • Detonate emails in containers to ensure that payloads are safe.

Many vendors will also throw around the buzzwords of the day with their associated acronyms — anomaly detection, machine learning (ML) and artificial intelligence (AI) — to give organizations assurance that this combination approach will prove impermeable.

Ultimately, this is basically several ineffective approaches stitched together in an attempt to make a supposedly effective approach. And while many of these solutions may help address the problem, the breaches continue, and the budgets dedicated to anti-phishing and email security solutions are wasted.

Insight into How to Fight Phishing

To understand the best approach to preventing phishing attacks, it’s crucial to understand exactly what has to happen for a phishing attempt to be successful.

Phishing attacks work because the end user clicks on a link, goes to a malicious website, and provides credentials, which are subsequently used to take over the user’s complete account. The most beneficial compromises from a hacker’s perspective are email accounts – G Suite and Microsoft 365, for example. Generally, all of a user’s other accounts are tied to their email, so once an email account is compromised, it can be used to reset every (Read more...)

*** This is a Security Bloggers Network syndicated blog from Blog – JumpCloud authored by Aubrey Harper. Read the original post at: