Skip to main content
Top

2020 | OriginalPaper | Chapter

Analysing Simulated Phishing Campaigns for Staff

Authors : Melanie Volkamer, Martina Angela Sasse, Franziska Boehm

Published in: Computer Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In an attempt to stop phishing attacks, an increasing number of organisations run Simulated Phishing Campaigns to train their staff not to click on suspicious links. Organisations can buy toolkits to craft and run their own campaigns, or hire a specialist company to provide such campaigns as a service. To what extent this activity reduces the vulnerability of an organisation to such attacks is debated in both the research and practitioner communities, but an increasing number of organisations do it because it seems common practice, and are convinced by vendors’ claims about the reduction in clickrates that can be achieved. But most are not aware that effective security is not just about reducing clickrates for simulated phishing messages, that there are many different ways of running such campaigns, and that there are security, legal, and trust issues associated with those choices. The goal of this paper is to equip organisational decision makers with tools for making those decisions. A closer examination of costs and benefits of the choice reveals that it may be possible to run a legally compliant campaign, but that it is costly and time-consuming. Additionally, the impact of Simulated Phishing Campaigns on employees’ self-efficacy and trust in the organisation may negatively affect other organisational goals. We conclude that for many organisations, a joined-up approach of (1) improving technical security measures, (2) introducing and establishing adequate security incident reporting, and (3) increasing staff awareness through other means may deliver better protection at lower cost.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
Some phishing messages are also referred to as spam. Spam includes any kind of unsolicited messages, so phishing messages are a sub-set of spam messages - and indeed many staff do not distinguish and use the “spam messages” instead of phishing.
 
2
Note that on the other hand, not all message with incorrect spelling and grammatical errors are phishing messages - with increasing digitalization and widespread use of social networking, and increasing awareness of conditions such as dyslexia, much non-malicious written communication contains such errors; when attackers impersonate some senders, it can even be interpreted as a sign of authenticity.
 
3
It is important to check the sender’s e-mail address and not just rely on the sender’s name, because the latter is very easy to alter.
 
4
Stajano, Wilson: Understanding Scam Victims: Seven principles for system security. Communications of the ACM 2011, 54(3):70–75.
 
5
Again, the same tactics are used by senders of legitimate messages .
 
6
Kumaraguru, Sheng, Acquisti, Cranor, Hong: Teaching Johnny not to fall for phish, ACM Transactions on Internet Technology 2010, 10 (2):1–31.
 
7
Burns, Johnson, Caputo: Spear phishing in a barrel: Insights from a targeted phishing campaign. in Journal of Organizational Computing and Electronic Commerce 29(1):24–39.
 
8
Benenson, Gassmann, Landwirth: Unpacking Spear Phishing Susceptibility. Financial Cryptography Workshops 2017: 610–627.
 
9
Wholesale general whitelisting means that phishers can take the same approach and can be sure that their phishing messages reach the recipient.
 
10
This can still be used by phishers if this information is leaked.
 
11
After the security audit, whitelisting is not helpful, because with an adequate security level of the security audit, most of the phishing campaign messages would be blocked and thus would present no risk to the organisation and its staff. This, again has a negative effect on how well the collected data reflects the organisation’s actual vulnerability.
 
12
If an external email service provider is used, this change may not be possible at all.
 
13
Burns, Johnson, Caputo: Spear phishing in a barrel: Insights from a targeted phishing campaign. in Journal of organisational Computing and Electronic Commerce 29(1):24–39.
 
15
The latter quickly becomes another security problem. Because these sensitive data must not be transferred.
 
16
This is particularly true in the case of Objective 3, and any other evaluation would also have limitations. Here, it may make sense to use different study forms for the evaluation.
 
Metadata
Title
Analysing Simulated Phishing Campaigns for Staff
Authors
Melanie Volkamer
Martina Angela Sasse
Franziska Boehm
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-66504-3_19

Premium Partner