Staged cyber schemes may help shore up 'weakest link'

Mock phishing attacks might be the best way to teach users to avoid them in the real world.

By David Jeffers, PC World |  Security

Your PC is locked down with a strong, complex password when not in use, and your mobile devices are secured with a passcode. You have a cross-device security tool in place on your PCs and mobile devices to block unwanted traffic, prevent compromise from malware attacks, and protect your sensitive data. Even with the best of the best security measures in place, though, theres still an Achilles heel that trumps it allyou.

Think of it like your house. You can have bars on the windows, and industrial-strength

deadbolts on solid steel doors. You can have surveillance cameras, an alarm system, and a bomb proof panic room. But, if a guy dressed like a cable repairman knocks on the door claiming that hes working on an issue affecting your neighborhood, and you open the door and let him in, its all for nothing.

That is more or less how youand people in generalare the weakest link when it comes to digital security. The tools you have in place can guard against known threats and can even identify and block suspicious activity from many unknown threats. But if you click on a malicious link in a phishing scam email, your security tools are more likely to view the activity as legitimate because you initiated it. If you open an attachment from an email that claims to be from the IRS or UPS, and fill in sensitive, personal information as requested, theres little your security tools can do to protect you.

A recent article in the Washington Post talks about companies training users on computer and information security. The idea is that users who are more aware of the threats, and how to recognize them are less likely to fall victim. The premise seems logical enough, but its not new. Companies have been conducting security awareness training for more than a decade, and yet many of the most successful attacks in recent years can be traced to individual users letting their guard down and opening the door for attackers.

There is a part of the Washington Post article, though, that sounds like a good idea and seems like it would be more effective at raising awareness. Northrop Grummana major defense contractorconducts mock attacks against users. Northrop Grumman sends phishing attacks to its own users that appear to come from unknown third-party sources. If they fall for it, theyre directed to a website that lets them know theyve made a mistake, and offers additional lessons for how to avoid such attacks in the future.


Originally published on PC World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness