Abstract
Although there have been numerous significant technological advancements in the last several decades, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect end-users have gotten better, the ‘human factor’ in cybersecurity is the main penetration surface. These three phishing methods are used by attackers to infiltrate corporate networks and manipulate end-users, especially through business email. Our research study was aimed at assessing several phishing mitigation methods, including phishing training and campaign methods, as well as any human characteristics that enable a successful cyberattack through business email. Following expert panel validation for the experimental procedure, a pilot study with 172 users and then a full study with 552 users were conducted to collect six actual end-users’ negative response actions to phishing campaigns conducted with traditional Commercial-Off-The-Shelf (COTS) product (KnowBe4) and a red team. Users were randomly assigned to three groups: no training; traditional training; and longitudinal customized training with 1,104 data points collected. While the phishing method was significant, our results indicate that current training methods appear to provide little to no added value vs. no training at all.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 10th International Conference on Information Systems Security and Privacy |
| Editors | Gabriele Lenzini, Paolo Mori, Steven Furnell |
| Publisher | Science and Technology Publications, Lda |
| Pages | 643-651 |
| Number of pages | 9 |
| ISBN (Print) | 9789897586835 |
| DOIs | |
| State | Published - 2024 |
| Event | 10th International Conference on Information Systems Security and Privacy, ICISSP 2024 - Rome, Italy Duration: Feb 26 2024 → Feb 28 2024 |
Publication series
| Name | Proceedings of the 10th International Conference on Information Systems Security and Privacy |
|---|
Conference
| Conference | 10th International Conference on Information Systems Security and Privacy, ICISSP 2024 |
|---|---|
| Country/Territory | Italy |
| City | Rome |
| Period | 2/26/24 → 2/28/24 |
Bibliographical note
Publisher Copyright:© 2024 by SCITEPRESS – Science and Technology Publications, Lda.
ASJC Scopus Subject Areas
- Computer Science (miscellaneous)
- Information Systems
Keywords
- and Awareness (SETA)
- Business Email Compromise (BEC)
- Phishing
- Phishing Campaigns
- Phishing Training
- Red Team
- Security Education
- Spear-Phishing
- Training
Fingerprint
Dive into the research topics of 'Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS