Most employees opt to delete suspicious emails rather than report them to their higher-ups. Little did they know that it could do more harm than good to their cyber systems.
A “frighteningly low” number of employees are informing their company regarding a potential email attack, even though there has been an increase in business email compromise (BEC) cases this past year.
For context, according to Microsoft, a business email compromise (BEC) attack is a cybercrime in which the fraudster uses email to convince someone to contribute money or reveal sensitive company information.
A report released by Abnormal Security shows an 81 per cent increase in the number of BEC attacks from the first to the second half of 2022.
Even though the numbers state that 28 per cent of the received employees opened compromised emails upon receiving them, and 15 per cent of them were responded to, only 2.1 per cent of the attacks were reported to the employers.
“On top of frighteningly low reporting rates for attacks, the majority of messages reported to security teams aren’t even malicious,” the report said. “On average, 84 per cent of employee reports to phishing mailboxes are either safe emails or graymail.”
Almost 98 per cent of the attacks are concealed from the company, making them unaware of the existence of a threat. As a result, most companies need to implement proper strategies to safeguard their systems against attacks.
“But security professionals know that opting to just delete the email without reporting it can be almost as damaging since it eliminates the opportunity for the security team to warn other employees about the attack,” the report said.
According to Abnormal Security, investing more money in email security could also be beneficial because it can ensure that BEC threats never get to employees.
“While security awareness training will help reduce the risk of employees engaging with a threat actor, it’s even better to minimise the number of attacks they receive in the first place,” the report said. “Any time an employee has to assess whether an email is malicious is an opportunity for them to make a mistake — and for an attacker to capitalise.”
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...