[Old] A Comprehensive Guide to Phishing Training for Employees
Home / SafeTitan Security Awareness Training / [Old] A Comprehensive Guide to Phishing Training for EmployeesPhishing is the most common form of cyber crime, with several reports estimating that 3.4 billion malicious emails are sent every day. As such, phishing is consistently the top method that cybercriminals use to hack into devices and corporate networks.
The high levels of phishing success are due to the insidious nature of the vector; as computing has become ubiquitous, human operators have been trained to react to specific triggers when using a computer. The 'urge to click' is one such trigger that is harnessed for good in helping to simplify interactions between computers and humans. However, these same behaviors are exploited by cybercriminals who manipulate an employee's trust, urge to click, or fears and concerns.
Scammers are masters of social engineering, and they use phishing to execute control of an employee's behavior, which is then used to help hack a company.
This guide to phishing training for employees will take you through the details of how phishing works and why phishing training for employees can help protect your organization from this most harmful cyber threat.
Phishing emails and other phishing mechanisms are ideal for cybercriminals because they are the touchpoint between the outside world and the corporate network. If a scammer can open that door, they will have free reign to escalate privileges, install ransomware, steal data, and trick staff into paying money into a hacker's bank account. The way to open the door is to get an employee to (inadvertently) welcome the hacker.
One of the reasons for the success of phishing as a cybercrime tool is that cybercriminals can modify phishing techniques and social engineering tactics to trick employees and evade detection. A recent example of evasion tactics was the exploitation of the popular email mass mailing tool Constant Contact by the hacking group known as NOBELIUM.
The attackers hacked into the Constant Contact account of the United States Agency for International Development (USAID) and used the account to send legitimate-looking emails to employees in over 150 organizations. The phishing emails were laden with malicious links, but because they were seemingly from a legitimate government agency, the phishing emails fooled recipients.
The campaign by NOBELIUM has continued to evolve, with a subsequent version using an HTML file attachment in a spear-phishing email. Once the recipient opened the file, JavaScript contained in the HTML file executed and began a series of events that resulted in a chain of infection.
Exploiting human behavior is a core element of phishing campaigns. Simulated phishing training replicates this to help employees spot the signs of social engineering.
This ability to continuously evolute phishing tactics is why scammers use phishing as the preferred tool for initial organizational access.
Evasion techniques follow the technology landscape. For example, the latest technology used by cybercriminals is Malicious AI. ChatGPT, an AI-enabled chatbot model, is an example of a tool that has been developed for legitimate use, but cybercriminals are now exploiting it. According to a recent paper, Creatively malicious prompt engineering, the authors Andrew Patel and Jason Sattler explain how ChatGPT can generate phishing and spear phishing emails.
One of the benefits to cybercriminals offered by ChatGPT is that people with poor language skills or non-English speakers can use the tool to generate sophisticated spear-phishing campaigns.
A recent advisory from Check Point Research (CPR) has found evidence that the cybercriminal community is using ChatGPT, with dark web forums discussing ways to exploit the chatbot.
More realistic phishing simulations can be created by observing how technology and working environments evolve. The European Union Agency for Cybersecurity (ENISA) watches the trends in the threat landscape. The ENISA Threat Landscape 2022 report states that phishing increases are due to the following:
“Advances in the sophistication of phishing, user fatigue, and targeted, context-based phishing have led to this rise.”
The report also lists some of the core landscape features. Many of these pullout notices could lend themselves to the evolution of phishing tactics as the decade unfolds:
The evolution of phishing has allowed cybercriminals to develop a rich source of techniques and tactics. The following is not an exhaustive list, as phishing tactics change with technology and working environments and take advantage of opportunities as they arise. However, the techniques shown below are some of the most common in the phishing landscape and should be noted:
The Constant Contact hijack by NOBELIUM shows the efforts that hackers will make to disguise a phishing email. By making the email look as legitimate as possible, including a real-looking email address, the recipient is more likely to believe the email is legit and therefore feel confident about clicking a (malicious) link or downloading an (infected) attachment. This also makes detecting a suspicious email by traditional email gateway solutions less likely. This is why employee phishing training is critical in preventing successful phishing incidents.
Phishing is often backed by sophisticated social engineering. Fraudsters often use surveillance and intelligence-gathering before embarking on a targeted phishing campaign. The intelligence garnered will help the scammer create believable emails that help build trust with the target employee. Using AI-enabled technologies such as deep fakes and AI-enabled chatbots is likely to make social engineering even more sophisticated and more difficult for employees to detect phishing unless the employee is well-trained.
Traditional email gateways are no match for evasive phishing emails. In 2021, 2 million phishing emails bypassed older-tech email protection. Name spoofing is used to circumvent technology to allow the phishing email to land in the target employee's inbox. Other evasion tactics include:
Evasion tactics are ones to watch as hackers continuously avoid detection to ensure a successful breach.
Trust is a core element of all phishing and associated social engineering attacks. A scammer will use many tactics to build up trust with the recipient. For example, spoofing common brands is a well-known technique to trick employees into thinking they are dealing with a legitimate company. The more famous the brand, the better. Of the 25 most impersonated brands, the top five in 2022 were:
Other brands making the cut included PayPal and Netflix.
However, it should be noted that when a cybercriminal targets a company and its employees, the scammer will collect information on the company’s suppliers, technology vendors, and other third-parties. This information is used to create phishing campaigns based on the spoofing of specific brands used by the organization. For example, a company may use a collaboration tool such as Slack.The fraudsters will then create a phishing campaign that is designed to steal employee login credentials to Slack.
You will have noticed the use of “consent request boxes” when you create a new account with an app or share information online. Consent phishing relies on in-built systems used by protocols such as OAuth 2.0 and the “urge to click”. Fraudsters register legitimate-sounding apps such as "Enable4Calc" to trick OAuth 2.0 providers and users. The apps trick users into consenting to share their data. This is followed by fraudsters beginning the campaign with a phishing message containing a link to the malicious app. If the employee clicks the link, the app opens and generates an OAuth 2.0 consent box. If the employee clicks to consent to share their data, the app generates an authorization code, which is sent to the attacker. This allows the attackers to legitimately access data, including personal data, contacts, and so on.
Text-based phishing or smishing has grown alongside the increasing use of mobile devices at work. Smishing works the same way email phishing works, and targeted smishing attacks are common. The only difference is that the malicious link is in a mobile message rather than an email. In 2021, almost three-quarters of companies experienced a smishing attack.
The popularity of the QR code is down to its convenience. This popularity is captured in a 2024 report on QR Code trends, which found a 47% increase in QR code usage each year. QR Codes are easy to use, with most Android and iOS smartphones offering in-built QR Code scanners. In the USA, around 80% of users trust QR code technology. It is this trust and convenience that scammers are exploiting.
The FBI warned about hackers using QR codes to hack corporate networks by tampering with the QR codes and replacing legitimate codes with malicious codes. The fact is that the QR Code is an ideal mechanism for fraud. Various tactics are evolving in this exploit, including using embedded image links in emails, which can load a QR code, and QR code images sent as attachments.
The use of multiple authentication factors (MFA or 2FA) is not a guarantee of safety from phishing. MFA is in the sights of cybercriminals who have worked out ways to circumvent this additional layer of security: researchers have identified toolkits for sale on the dark web that bypass two-factor authentication. But, again, technology alone cannot thwart cybercriminals. Phishing and other security training for employees are vital to combat cyber threats.
SafeTitan uses advanced training techniques and simulated attacks to train employees to spot malicious emails. Learn more about SafeTitan in a free demo.
Book Free DemoAs demonstrated, phishing is a complicated and sophisticated attack that is increasingly hard to prevent using technology solutions alone. Therefore, as part of a comprehensive phishing prevention program, employees must be trained to recognize the signs of a wide range of phishing attacks.
This is achieved by using phishing training for employees. Simulated phishing exercises are part of a dedicated training program that builds a culture of security in a company and creates a human firewall that protects the organization from cyber threats. The Aberdeen Group offers an insight into the effectiveness of security awareness training:
“reduction in risk of about 50%; a median annual return on investment of about 5-times; and a reduction in the “long tail” of risk from phishing attacks of more than 2.5 times.”
Phishing simulation solutions provide a platform to generate, deliver, and track simulated phishing messages sent to employees. In addition, the phishing simulations offer intensive training sessions focusing on the many aspects of phishing attacks. SafeTitan is a cloud-based Cyber Security Awareness and Training platform developed to assist in building a human firewall and a security culture that encourages positive security behavior.
Phishing simulation is integral to SafeTitan's Cyber Security Awareness and Training platform. The phishing simulator is controlled centrally, administering and managing simulated phishing campaigns from a central console. In addition, thousands of phishing email templates provide a rich library of ready-to-use and adjustable fake phishing emails.
The campaigns generated using SafeTitan are used to educate employees on how to spot and stop phishing, preventing security breaches, data exposure, and ransomware infection.
Phishing employees using SafeTitan simulated phishing provides tangible benefits
There are many security awareness training packages on the market. Choosing the best one for your organization can be challenging. However, it is essential to consider the comprehensive nature of any security awareness solution offering.
Security awareness training must focus on changing negative security behavior into positive actions. This comes from a rounded, knowledge-based understanding of security, across the board, from phishing to security behaviors such as poor password hygiene. In addition, security awareness training must address the behavior of employees at an individual level.
SafeTitan security awareness training uses behavior-driven awareness training to change poor security patterns and create a security-first mindset throughout your organization. SafeTitan uses cutting-edge behavioral research as the basis for the SafeTitan solution.
To achieve this all-around approach to empowering employees and building positive security behaviors, SafeTitan provides a comprehensive suite of solutions. It is much more than a phishing simulation platform: SafeTitan is a defense-in-depth training solution designed to prevent human-centric cyber-attacks.
Some of the core features that make SafeTitan stand out from the crowded security awareness training marketplace are:
SafeTitan excels at building broad, comprehensive training for employees. This is an important differentiator from other competitors in the security awareness arena. Phishing simulations must be delivered as part of a wider, multi-layered, human-centric approach to security. Behavior only changes with repeated training that builds upon learning sessions. As well as providing phishing training for employees, SafeTitan delivers training in other areas, including:
SafeTitan training educates employees about the importance of a “clean desk.” A “Clean Desk Policy” is a requirement of regulations such as ISO 27001. A clean or tidy desk is also an vital element of general security hygiene, which includes password hygiene, data awareness, and awareness of data exposure via email.
Check Point Research (CPR) points out that social networks are the most likely to be imitated to steal data, with business social site LinkedIn associated with 52% of all phishing-related attacks globally. Therefore, cyber security awareness and phishing simulations must include training in social engineering tactics such as:
Identity theft is behind many scams and fraud events.. In 2023, there were more than 1 million reports of identity theft received through the FTC’s IdentityTheft.gov website. The data behind an identity is Personally Identifiable Information (PII). Employees should be educated about what PII is and how to ensure it is not exposed. A cyber security awareness program includes training on safe data protection and destruction and personal data awareness.
Safe online browsing is an intrinsic part of anti-phishing measures. The problem is stark, with statistics from Google’s Safe Browsing research showing that over 4.2 million warnings were issued on December 4th, 2022 alone. Employees should be trained in how cybercriminals trick them into navigating to infected and malicious websites.
Checkpoint research on mobile security found that 46% of organizations had at least one employee download a malicious mobile app. Smishing is also a mobile threat that is increasingly targeting employees. Security awareness training should include mobile security that encourages good security behavior involving mobile devices, that is, safe app downloads, device replacement safe procedures, and safe surfing from a mobile device.
SafeTitan uses advanced training techniques and simulated attacks to train employees to spot malicious emails. Learn more about SafeTitan in a free demo.
Book Free DemoPhishing is costly, the global average cost of a data breach in 2023 was USD 4.45 million, a 15% increase over 3 years. Cyber-attacks are costly and include tangible and intangible costs related to IT system downtime, IT support, productivity losses, and brand damage. An Osterman report highlights cyber security training as an "essential" measure to prevent cyber-attacks.
Phishing training for employees builds a human firewall around your organization, making it much harder for cybercriminals to gain unauthorized access to company resources. By using phishing and broader security awareness training, your organization is investing in cyber security threat mitigation.
Phishing training and security awareness are recognized across industry and in standards and regulations as vital to security preparedness. Also, many Cyber Security Insurance policies require that phishing training is performed.
Simulated phishing exercises should reflect the real-world threats to your industry sector and employee roles. Below are some examples of phishing training exercises that can be created using SafeTitan:
BEC scams often target employees in the finance or accounts payable departments. However, they also focus on C-level executives, including the CEO. Create a simulated phishing training exercise that tests these employees on potential BEC scams.
Note: Use SafeTitan’s email templates to create this phishing exercise.
Cybercriminals carrying out BEC scams do their homework and will have gathered intelligence on your company. Therefore, the email should contain the following elements:
Microsoft is one of the most spoofed brands. Phishers use well-known brands to send mass phishing emails to many employees across multiple departments and organizations.
Note: Use the templates available in SafeTitan to create an Office 365 branded email and a landing page that is designed to collect Office 365 login credentials.
"Hello, you have requested to close your Office 365 account. This will take effect in 24 hours unless you cancel the request using the link below. If your account closes, you will have no further access to pay slips, work documents, emails, etc."
SMBs (small to medium-sized organizations) are as much at risk of phishing as their larger counterparts. However, finding the time, resources, and security skills to deliver consistent and regular employee phishing training can be more challenging for a smaller company. But security training is vital to keep an SMB safe.
Research by TitanHQ has found that regular security awareness training using SafeTitan reduces susceptibility to phishing to under 3%. Notably, this result is even better than the Osterman Report data, which found that only 11% of employees could spot a phishing email before phishing training. In contrast, after training, 64% could detect phishing emails.
This low level of phishing susceptibility will ensure that an organization can significantly improve its security posture; unfortunately, only 32% of small businesses carry out phishing training for employees.
This is where a managed service provider (MSP) comes in. An MSP can offer managed security services to SMBs. MSPs that deliver security services, including phishing training, have specialist personnel and knowledge that allows them to create effective and tailored phishing simulation and security training campaigns.
The MSP is also skilled in interpreting the metrics output from security training solutions such as SafeTitan. Using an MSP to deliver phishing training for employees is an ideal way for SMBs to have exceptional security training for employees that protects their organization from the expensive costs associated with a cyber-attack.
SafeTitan is a solution that has been designed to be delivered both in-house and via an MSP. TitanHQ offer MSPs a unique selling package that provides them with an exceptional training service for clients that delivers regular income.
Research from Datto points out that 85% of MSPs have experienced attacks against their SMB clients in the last two years. Any MSP offering a solution that delivers world-class training in security will give that MSP a compelling competitive edge.
SafeTitan is a powerful and inventive technology that generates realistic and relevant simulated phishing campaigns to empower your employees against phishing. TitanHQ is the world-renowned security vendor behind SafeTitan, bringing award-winning exceptional customer support to back the use of SafeTitan. G2 and Gartner reviews consistently place TitanHQ products as high-performance. Some of the SafeTitan features that have helped to make it a phenomenal security training platform include:
MSPs can offer a fully rebrandable security awareness training solution to customers. Any MSP choosing SafeTitan to deliver security training to their client base will benefit from:
Phishing is one of the leading causes of costly data breaches. Therefore, security awareness and phishing training for employees must become a recognized and vital part of a security strategy. As phishing and cyber-security tactics evolve to evade detection by traditional security tools, organizations can no longer rely on technology to combat the onslaught of evolving phishing threats.
Instead, an organization must turn to its people and make security everyone’s business to create a human firewall. As cybercriminals continue to challenge companies of all sizes, having a tool that empowers employees is a decisive way to stop scammers that exploit human behavior.
SafeTitan uses advanced training techniques and simulated attacks to train employees to spot malicious emails. Learn more about SafeTitan in a free demo.
Book Free DemoPhishing is the most common technique employed to hack corporate devices and networks; in 2022, the FBI IC3 received 300,497 reports of phishing with BEC, fraud costing US victims over $2.7 billion. Due to the ubiquitous nature of phishing, phishing training prevents the successful targeting of employees using malicious emails. Phishing training uses mock phishing tests, interactive content, quizzes, and behavior-led sessions to ensure employees can identify and prevent phishing attacks.
According to research, 90% of data breaches use phishing emails as part of the cyber-attack. Training is based on education, informed by analyzing and understanding human behavior. A behavior-led phishing education focuses on changing risky actions that lead to successful cyber-attacks. Phishing education focuses on several areas:
Employees are educated about the many types of phishing. Employees learn how fraudsters use any communication channel to trick and exploit them. Employers should inform employees about all forms of email phishing, including spear phishing, clone phishing, barrel phishing, etc. Other forms of phishing, such as Vishing (phone calls), SMShing (text messages), Whaling, etc., are also part of phishing education for employees.
Phishing training educates employees on the basics of phishing, what a phishing attack looks like, who is at risk, and how to spot tell-tale signs. It includes teaching employees about the dangers of social engineering. Training on phishing types show how cybercriminals will try to build relationships with targeted employees to ensure success. Phishing education for employees educates staff about how an instinct to do a good job, click links, and be helpful, is exploited during a phishing attack
Emails are predominantly the primary type of phishing used to target employees. As such, a focus on email phishing training for employees is essential. As well as using interactive content, email phishing training should include the following:
SafeTitan provides a cloud-based platform to set up, deliver, monitor, and analyze simulated phishing exercises. Fake phishing emails are sent to employees to check their level of education in phishing tactics and tricks. The simulated phishing platform will also deliver contextual learning; when an employee performs a risky behavior associated with the fake phishing email, the platform will pop up a learning exercise to teach them what would happen if this was an actual phishing email.
Regular simulated phishing exercises and regular cyber security awareness training in phishing are essential for achieving excellent education outcomes. In addition, repeated sessions that build on previous education and training will help to make training more effective. Coupling this approach with tailored and roles-based training sessions, and email phishing training for employees, delivers successful training that prevents cyber-attacks.
Cybercriminals are adept at developing phishing campaigns that target employees. Therefore, organizations should also establish dedicated phishing campaigns to counteract these malicious attacks. Additionally, a phishing campaign should take certain phishing factors into account; for example, will your test phishing email include: malicious links, malicious attachments, malicious websites.
Phishing campaigns should be both tactical and strategic: Strategic - plan out what you want to achieve from your phishing campaigns. E.g. will the phishing campaign be a company-wide exercise that handles general phishing? Or roles-based targeted phishing? Tactical: the tactics will include considerations such as: Will the campaign use mock phishing templates available in a phishing simulation platform?
A single click on an infected attachment or input of data into a malicious website can end in severe harm to an organization. Employees will become adept at spotting phishing messages through regular, tailored, behavior-led training. However, phishing evolves, so phishing awareness must be an ongoing commitment that reflects real-world phishing attacks. Repeated phishing awareness training will benefit both the company and the employee by empowering the employee with education.