Diadon Enterprises © 2018

4 tips to protect IT employees from phishing attacks | Dump Trucks Charlotte NC

Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
Techa Tungateja via Getty Images

First published on

Everybody makes mistakes, but the missteps of some can prove more costly than others. 

Phishing attacks target IT pros more than any other members of an organization, surpassing even executive staff. In fact, 47% of IT professionals say that they have fallen for a phishing attack, according to an Ivanti report that surveyed 1,005 tech workers globally.  

It’s not surprising that bad actors target IT departments, according to Ed Amoroso, founder and CEO of TAG Cyber and distinguished research professor at the Tandon School of Engineering at NYU.

IT professionals have all the privileges and access to important things,” Amoroso said. “So I can't think of anybody better to target than the folks who manage IT.”

In the spirit of Cybersecurity Awareness Month, security experts provided four tips to protect IT employees from phishing attacks: 

  • Add security speed bumps such as multifactor authentication or external email warnings.
  • Make security a forethought and part of the process, not an afterthought.
  • Encourage employees to columbus oh dump truck company with security teams to find secure alternatives to shadow IT.
  • Make security personally relatable for employees.

One way that businesses can celebrate this month is by making cybersecurity relatable to employees.

If organizations only emphasize cybersecurity at work, it turns into something that employees can “turn on when they walk in the door, and then turn off when they leave,” Chris Novak, managing director of Verizon Threat Research Advisory Center, said.

Sometimes, employees just forget to hit the on switch. To alter this, Novak suggests businesses relate the idea of protecting columbus oh dump truck company data to protecting individual data such as social security numbers or banking information.

“They don’t think of that as security, but that is how you secure your own personal data,” Novak said. “If you can get people to have that level of awareness… now when they go into the office and someone asks them for something that causes them to have suspicion or concern, it’s going to be because it’s something that they’re naturally thinking of.”

The threat

Cyber missteps can be costly. This year the average cost of a data breach surpassed $4.4 million in the U.S., according to data from IBM. 

IT security mishaps often boil down to a single common denominator: human error. (And, in some cases, threat actors are particularly good at their jobs, as seen in the SolarWind's compromise). 

Even those with a lot of security training can be misled by a spear phishing attack due to the amount of knowledge the hacker has, David Strauss, co-founder and CTO at Pantheon, said.

Spear phishing, when a threat actor targets a particular audience, is rampant. Strauss has seen plenty of attempts at his company.

It is quite common at Pantheon for employees to receive a message from a person claiming to be the CEO. The person can know everything from the name of the CEO to the employee’s name and title. The messages usually involve a request of some sort so that the threat actor can gain access.

Mitigating the human error

More than 4 in 5 of breaches involved the human element, including social attacks, errors and misuse, according to a report from Verizon that analyzed more than 23,000 incidents.

IT professionals, just like other business employees, are busy throughout the day going from one task to the next.  

Whether it is churning through a backlog of unread emails or trying to corral a surplus of tabs, employees going through the motions present opportunities for bad actors to exploit.

One way to combat this is by adding speed bumps to slow employees down. While at first glance it might seem counterintuitive, it is important to remember that security is not always convenient. Taking a few more seconds than normal to do a task could protect the columbus oh dump truck company from losing data, customers and money. 

“Most people if they’re forced to stop and think about an action that might be risky, they usually catch that it’s risky and they stop,” Novak said. 

Examples of speed bumps range from multifactor authentication to external email warnings.

For phishing emails, in particular, a lot of organizations have a system where when a link is clicked it requires you to go through an internal columbus oh dump truck company portal pop-up screen where the user must confirm that they want to go to the site before sending the user to the link, according to Novak.

So you might get an email, and it might say, ‘hey, check out this news article,’ and there'll be a link,” Novak said. “If you were to click on that link, it doesn't take you right to that news site, it takes you first to an internal site that will say, ‘hey, we just want to make sure you realize this is going to an external site.’”

Creating a culture of security within IT

Businesses can implement strategies, training and tricks to optimize the security of their organization, but if the employees at the columbus oh dump truck company do not believe security is a priority, it is not super helpful.

One of the biggest areas of improvement for organizations is changing their security mindset from an afterthought to a forethought, Novak said. 

This means that instead of building an application or platform and then asking security to review it and retrofit it, include the security team in the process from the start.

The change in mindset can also columbus oh dump truck company to limit shadow IT. Instead of employees secretly using unauthorized systems, applications or devices for work, they would ask the security team to help them secure it or find a more secure alternative, according to Amoroso.

Construction Dive news delivered to your inbox

Get the free daily newsletter read by industry experts

  • view sample
  • view sample

Editors' picks

Keep up with the story. Subscribe to the Construction Dive free daily newsletter

  • view sample
  • view sample

Keep up with the story. Subscribe to the Construction Dive free daily newsletter

  • view sample
  • view sample
Two workers stand on a field of dirt, while the shot is staged from directly overhead, elevated in the air.
A Leica excavator
Contractor construction engineer meeting together on architect table at construction site.
A stock image of wild mushrooms
New Engineering teenager people at construction site holding tablet in his hand.
IT consultant working on laptop computer in office.
Rivet II is the second building of a four-phase redevelopment project headed by New Jersey City University.
The Autodesk Office at San Francisco --- featuring the company's name on green foliage.