Last week I received an email from a reporter writing a story about how to avoid social engineering scams that trick medical staffers into clicking on an infected email link. He was looking for expert advice on how to train staffers to recognize these phishing scams, and what technology can help block infections should they fall victim to these scams. As I sat down to respond, it hit me that as fast as things evolve in IT, phishing and spear phishing still remain one of the most effective ways – if not the most - for an attacker to find their way into their target’s network. Phishing emails used to be embarrassingly easy to spot – crafted, often by non-English speakers and were riddled with typos and poor grammar. These days, phishing and especially spear phishing emails can be virtually impossible to detect. With that being the case, I wanted to share my response to the reporter, as these tips can help any organization – not just those in the healthcare industry: Social engineering scams are hard to prevent since they target the weakest point in the cyber security eco-system: people. Awareness training for employees and other relevant people on how to identify and avoid such scams is important and can reduce the risk, but it is a process, not an event. That said, here are some general best practices: For users:
For IT/Security staff
Here at Cybereason, our belief is that a motivated attacker will always – and we mean ALWAYS - find a way in. Therefore, the best defense against modern attacks is to invest in fast detection and containment. Not only will you likely learn you have already been breached, but once an attacker has found a good place to burrow its malware into your network and hide, if you don’t actively hunt for the code or for anomalies, as report after report has confirmed, odds are you’re not going to find it for quite some time. That is not to say that non-technical workers do not have a responsibility to be vigilant, which is why user awareness training and the consistent promotion of a culture in which security processes and practices are incentivized and rewarded is a must. Currently, there is no silver bullet for security and we doubt one will come along any time soon. But weaving the above suggestions into daily operations is bound to help. For more information on post breach attack detection, feel free to reach out to me directly at lotem@cybereason.com.