The education of end users is the missing element in corporate cyber security, said an expert panel at this year's RSA conference.
Panel members say that educating end users in how to recognise phishing emails is one of the best ways to prevent attack. They report that the ever-increasing sophistication of attackers means that phishing emails are no longer as easy to spot as they once were.
"The thing that blows my mind is that as that threat ecosystem has evolved, the efficiency of these actors has gotten so much higher," said managing partner at MAD Security Mike Murray during a panel on social engineering in the cyber security space.
"The things we used to see state-sponsored actors do is now being done by all bad actors."
Murray says that the threat landscape for email phishing scams has evolved past the old "Nigerian prince" scams of the early 2000s. He says that attackers are now improving their methodology and getting better at social engineering emails.
"Every breach I've been involved in the last five years started with a phishing attack," continued Murray
"The bad guys are getting more sophisticated. It's not just a Nigerian prince anymore."
The MAD Security executive highlighted new scams which feature emails that don't even feature malicious links. He told delegates at RSA that if a scammer successfully social engineers an email, they can convince some end users to hand over private information on their own volition.
For an example, he discussed a test phishing scam his company ran that featured a non-malicious website that tricked users into entering in their account information by promising to strengthen their password.
"We saw a gradual progression of things getting much more organised. The common element is they saw that the weak link was human interaction," said fellow panelist chief executive of PhishMe, Rohyt Belani.
Belani said that when his company performed test phishing attacks 26 percent of those who were hit were tricked into inputting their personal information. In total, Belani reported that phishing attacks worked 58 percent of the time.
But while security people have tried to educate users, part of the problem may be their inadequacies as trainers, Murray said.
"We insist on overloading people with all this data that only we find interesting as security people," said Murray.
Both Murray and Belani agree that the best way to educate end users is focus on behavior modification and not simply education.
The panel's discussion comes following a slew of higher profile attacks that started because of a phishing attack. Apple, Microsoft, and Facebook were all the victims of an attack earlier this month.
Security firm claims that 117,638 sites out of 135,035 analysed contain serious security flaws
AimBrain adds lip-sync capabilities to its biometrics system
Canadian scientists claim to have found a way to mass produce plastic semiconductors
RAND claims AI could enhance strategic stability by improving accuracy in intelligence collection and analysis