SHARE
Facebook X Pinterest WhatsApp

The Weakest Link in Cyber-security? Us

Jul 27, 2016

It’s increasingly clear that cyber-crooks are becoming smarter and better at breaking into systems. Yet, all of this isn’t the result of any remarkable advances in malware. It’s mostly due to tricking human beings into handing over the keys to the kingdom.

A research report from security software vendor Proofpoint, The Human Factor 2016, offers some perspective on how human flaws have supplanted system flaws. It notes that attackers are currently focusing on three primary methods:

Tricking recipients into ignoring security. An employee might click a bad link, open an infected document, download a file with malware based on the belief that he or she is addressing a real task. These high-volume methods attempt to sidestep security tools and protocol an enterprise might use.

Convincing targets to hand over credentials. These medium-volume campaigns target key individuals and attempt to gain access to their usernames and passwords. With this information, they have free access to the network and systems.

Using impersonation techniques. These low volume campaigns, which spoof a CEO or senior executive, focus on key individuals that have the right job duties and account access. These individuals initiate a transaction — such as a data transfer or bank wire to a fraudulent account — under the belief they are doing their job.

In addition, Proofpoint’s 2016 second quarter Threat Summary Report, offers some perspective on where things are at and whey they appear to be headed. After examining more than one billion e-mail messages and 150 malware samples, it noted that social media phishing attempts rose by 150 percent over the previous quarter. JavaScript attachments led a remarkable 230 percent spike in malicious message volume quarter over quarter.

Meanwhile,  ransomware attachments increased by 45 percent since Q1, and 80 percent of survey participants said their companies experienced at least one Business Email Compromise (BEC) phishing attack within the past month.

In the mobile arena, as many as 10 million Android devices were compromised by exploit kits. An overwhelming 98 percent of mobile malware is still associated with the Android platform. Finally, on the social media front, there has been a 150 percent increase in phishing as compared to the same period in 2015.

Other recent studies confirm the trend toward more sophisticated phishing, spear-phishing and whaling attacks. The takeaway? Organizations must amp up education and training, use tools that help identify bad domains and links, and adopt security solutions that blacklist bad sites.

Recommended for you...

Ransomware Attacks: The Endless Horror Movie
Drew Robb
Dec 30, 2021
What Businesses Must Learn About Data Integrity From the IMF Controversy
Dan Adams
Dec 21, 2021
Succeeding in a Crowded MSP Marketplace
Drew Robb
Oct 11, 2021
Don’t Overlook IT Risk Compliance When Defending Against Cyberattacks
Richard Chambers
Sep 22, 2021
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.