It’s long been touted that humans are the weak link in an organisation’s cyber defences.
There’s a reason phishing attacks are on the rise – it’s the easiest way for hackers to gain access to your systems, so they can do things like install ransomware or steal information. All it takes is for one of your employers to download an attachment or click a link they shouldn’t have and your beautifully constructed cyber security solution will come crashing down.
But don’t just wait for a user to get tricked so you can blame them and help make the multitude of reports I’ve found online even scarier!
There are some simple things you can do to help educate your employees and give them the best chance of recognising an email with malicious intent…
At ThirdSpace, we include a visual cue on all incoming emails:
This acts as a reminder to our employees to check the message has come from someone they know – especially before following any instructions or opening any attachments.
I do recommend you maintain an exceptions list – i.e. leave the visual cue off known customer and supplier domains. This gives the warnings more impact. When emails do arrive with the banner applied, it prompts users to question the content.
If it’s automatically applied to everything, they’ll start to ignore it. We’ve added client domains to an exceptions list in Exchange Online to remove the warning banner from those we trust.
I’ve also excluded it from being applied to internal mail, which helps me spot if anyone is trying to impersonate one of our users.
Download 'The six biggest cyber security threats to your organisation' to gain:
What’s wrong with this email?
One of the simplest ways to educate your users is to craft a phishing message, take a screen shot and share it with them. Explain it’s an example of a phishing attack, but ask them to tell you how they would have known.
This will get them thinking – and as gaps in their knowledge appear, it will give you an opportunity to show them how to check a URL is safe or identity a fake domain name, etc.
On the subject of fake domains – consider buying a domain name that looks similar to your own or take advantage of Microsoft Office 365 Phishing Attack Simulator.
According to Microsoft, 75% of all company breaches now start with a phishing attempt. So, whilst it might not sound like the nicest idea to ‘trick’ your employees, there’s a real business case to be made for running a simulated phishing email campaign internally.
With Office 365 Attack Simulator, your job is made easier as it comes with several phishing templates. But, however you choose to run your campaign, make sure it’s not just a one off – send a few emails, over a series of weeks, and vary the phishing technique with each.
This will help you highlight where people are most susceptible – and who is most susceptible for that matter – so you can focus your education and guidance investments.
You’re doing annual penetration testing, right?
And you’re doing it correctly?
Including a phishing exercise as part of your annual penetration testing is a must.
There’s nothing like a real-world test to see who’s vulnerable to phishing and test the technology you have in place.
A good penetration tester will have lots of sneaky ways to try and catch your users out. You can use that data to improve your training and look at any gaps in your technological implementation.
Whether it’s visual cues or simulating phishing emails – all my previous tips are enabled or made much easier with Microsoft Office 365.
We talk to so many companies who are paying for licenses but aren’t enabling all the features that are available to them.
Don’t waste resources or take unnecessary risks – configure Exchange Online Protection effectively and switch on features like ATP anti-phishing protection today.
Next, download ‘The business case for cyber security’ e-Guide for best practice on how to take a proactive and pre-emptive approach to tackling the issue.
Or learn more about Microsoft 365 licensing in our blog. Gain answers to the most common questions.
Simply request a free Vision Call. We can help you with solution ideas, technology education, best practice advice and more.Request Vision Call
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.