Organizations worldwide stand to lose an estimated $9 billion in 2018 to employees clicking on phishing emails. We hear about new phishing attacks regularly from the news and from our friends. So why DO so many people still click? NIST research has uncovered one reason, and the findings could help CIOs mount a better defense.
The findings — distilled in the brief video above — reveal that context plays a critical factor in why users click or don’t click on a phishing email. The more the context of the message seems relevant to a person’s life or job responsibilities, the harder it is for them to recognize it as a phishing attack.
Organizations can improve their defense strategies by considering the team’s broader findings, which are based on more than four years of data gathered by the NIST team in a real-world work environment. By studying not just which deceptive emails led some employees to click, but the reasons why they clicked, the team found that employees are more likely to click on links and attachments when the premise of the email matches their work responsibilities. These email users were concerned about failing to be responsive to their job duties.
Punishing — or even firing — such conscientious employees who fall for scams is not the best approach. Instead, CIOs should try to build an organization of engaged users. If an organization looks more closely at their own data on click rates and reporting rates, it can use this information to improve both human user training and the electronic filters that attempt to identify phishing emails.
A new article in IEEE Computer written by the research team offers a complete set of recommendations for CIOs, and a paper presented at the 2018 USEC conference provides details on the research methods and results.