The education of end users is the missing element in corporate cyber security, said an expert panel at this year's RSA conference.
Panel members say that educating end users in how to recognise phishing emails is one of the best ways to prevent attack. They report that the ever-increasing sophistication of attackers means that phishing emails are no longer as easy to spot as they once were.
"The thing that blows my mind is that as that threat ecosystem has evolved, the efficiency of these actors has gotten so much higher," said managing partner at MAD Security Mike Murray during a panel on social engineering in the cyber security space.
"The things we used to see state-sponsored actors do is now being done by all bad actors."
Murray says that the threat landscape for email phishing scams has evolved past the old "Nigerian prince" scams of the early 2000s. He says that attackers are now improving their methodology and getting better at social engineering emails.
"Every breach I've been involved in the last five years started with a phishing attack," continued Murray
"The bad guys are getting more sophisticated. It's not just a Nigerian prince anymore."
The MAD Security executive highlighted new scams which feature emails that don't even feature malicious links. He told delegates at RSA that if a scammer successfully social engineers an email, they can convince some end users to hand over private information on their own volition.
For an example, he discussed a test phishing scam his company ran that featured a non-malicious website that tricked users into entering in their account information by promising to strengthen their password.
"We saw a gradual progression of things getting much more organised. The common element is they saw that the weak link was human interaction," said fellow panelist chief executive of PhishMe, Rohyt Belani.
Belani said that when his company performed test phishing attacks 26 percent of those who were hit were tricked into inputting their personal information. In total, Belani reported that phishing attacks worked 58 percent of the time.
But while security people have tried to educate users, part of the problem may be their inadequacies as trainers, Murray said.
"We insist on overloading people with all this data that only we find interesting as security people," said Murray.
Both Murray and Belani agree that the best way to educate end users is focus on behavior modification and not simply education.
The panel's discussion comes following a slew of higher profile attacks that started because of a phishing attack. Apple, Microsoft, and Facebook were all the victims of an attack earlier this month.
Company that claims Google almost put it out of business celebrates EU Google whacking
Intel launches 64-layer 545-series SSD - but doesn't offer significant performance or price benefits
Not much faster or cheaper than existing technology at the moment, though
Met Police Windows XP migration programme slows with 18,000 PCs still running the antiquated operating system
Met Police still trying to migrate to Windows 8.1 despite its replacement in mid-2015 by Windows 10
Four arrested by City of London police in Microsoft-aided investigation into IT support scam callers
Arrests are 'just the beginning', say City of London Police