With more than 3 billion phishing emails received each day, employees are bound to make a mistake, clicking on a malicious link that could result in a cyberattack. The Cybersecurity and Infrastructure Security Agency (CISA) estimates that over 90% of successful cyberattacks are initiated by a phishing email. But what exactly is phishing?
Phishing is a type of social engineering where threat actors entice email users to give up their login credentials or unwittingly click to visit malicious websites. Typically, threat actors use phishing campaigns to steal login credentials for network access or to deploy malware for activities such as escalating user privileges, disrupting systems, and maintaining persistence on compromised systems.
To reduce the impact of phishing attacks, CISA, the National Security Agency, the FBI, and the Multi-State Information Sharing and Analysis Center jointly released Phishing Guidance: Stopping the Attack Cycle at Phase One. The guide outlines phishing techniques, discusses mitigation, provides recommendations for small and midsize businesses, and offers guidance for software manufacturers.
The barrage of phishing emails from threat actors is relentless. Many of the emails are obvious scams, but others are quite convincing to the unsuspecting user. The guide explains how threat actors have two primary purposes when launching a phishing attack:
Threat actors target organizations of every size and industry, so it’s important to follow best practices to reduce your cyber risk.
To protect login credentials:
To prevent malware execution:
The guide also recommends incident response and reporting measures to remediate identified phishing activity.
Many small and midsize businesses simply do not have the budget to hire a dedicated IT cybersecurity staff. For these organizations, the guide recommends following best practices to stay safe from phishing.
To protect network resources, organizations should implement annual phishing awareness training, identify network phishing vulnerabilities, and use a strong form of MFA.
To prevent phishing compromises, organizations should use technical solutions such as requiring strong passwords, employing DNS filtering or firewall denylists to block malicious websites, implementing antivirus solutions and file restriction policies, setting software applications to automatically update, enabling safe web browsing policies, using a secure virtual private network with MFA enabled, and migrating to managed cloud-based email services.
Software manufacturers should create and distribute software that is safe from phishing threats to improve cybersecurity for their customers. The guide recommends putting secure-by-design and default tactics into software development practices. CISA offers additional in-depth principles and approaches for technology providers and software developers.
Threat actors send billions of phishing emails every day, and, no doubt, several malicious emails are arriving in your employee inboxes. To stay safe from phishing attempts, your organization should heed government agency guidance and take proactive steps. Read the full guide to learn more.