In addition to phishing, ransomware is still another significant problem with two-thirds of Australian survey respondents saying their organisations were affected.
User training – or the lack of it – could be part of the problem.
While 80% of Australian survey respondents said their workforce shifted to working from home in 2020, only 32% said they trained users on safe remote working.
|
For example, "42% of Australian workers say they allow their friends and family to access work-issued devices to check emails, use social media, shop online, play games, and other activities," said Proofpoint ANZ area vice president Crispin Kerr.
"Although this is an improvement from what our survey showed a year ago – where 51% of Australian workers allowed such activities in their work-issued devices – these ongoing gaps still represent a very significant risk and reinforce the need for security awareness training initiatives that are tailored to the remote workforce,” he added.
According to Kerr, email remains the top threat vector in Australia – and globally, for that matter, so it is critical to train users how to spot and report attempted cyberattacks, especially when working remotely.
"While many organisations in Australia say they are delivering security awareness training to their employees, our data shows most are not doing enough,” he said.
On the subject of ransomware, 67% of Australian infosec professional respondents said their organisations were victim of a ransomware infection in 2020 as a result of successful phishing attacks, up from 54% the year before. This is well above the global average of 47%.
Among the Australian organisations that paid the ransom, only 50% received their data back after the first payment. Another 43% got hit with follow-up ransom demands that they agreed to pay, eventually regaining access to their data.
Training does appear to pay off: 86% of surveyed Australian organisations surveyed said security awareness training has reduced phishing susceptibility. However, only 68% offer formal training sessions to users as part of cybersecurity training initiatives.
Around a quarter of Australian organisations rely solely on using simulated phishing tests. The 'big stick' is also being wielded, as half of the local infosec survey respondents said their organisation punishes employees who regularly fall for real or simulated phishing attacks.
That doesn't just mean additional training. 76% said measures include counselling from the infosec team, 72% use disciplinary actions such as a written warning enforced by HR, and 64% use it as a negative factor during yearly performance reviews.
Given some previous findings that repeated training does not make much difference to the likelihood of the unwanted behaviour being repeated, it is interesting to note that 88% said a consequence model led to an improvement in employee awareness.
Part of the problem could be that while 59% of Australian workers know they should be suspicious of all unsolicited emails, 22% of Australian workers think their organisations will automatically block all dangerous messages.
So it seems that both skill and technology improvements are still needed.
The 2020 State of the Phish Report is available here (registration required).