A scene from the movie Oceanâs 8 provides a surprisingly useful lesson on cybersecurity.
The character played by Rihanna needs to hack into a security personâs computer. She looks up his social media to find he loves corgis. The Rihanna character sends him a phishing email featuring corgis, and he canât help but click on it.
With one click of a mouse, someone can accidentally give away their companyâs secrets, their bank account information, or an organizationâs medical records.
I thought this movie scene was interesting because it is a depiction of the importance of my work as a cybersecurity researcher at NIST. It shows just how easy it can be to fall victim to one of these schemes.
And many people donât realize that you (yes, you!) can be personally targeted by someone looking to get into your computer or your employerâs. Itâs easy for a hacker to find out about you and your job and write a convincing email.
Why Phishing Is Effective
Organizations do everything they can to keep phishing emails away from their employees, but even the best spam filters canât catch all of these messages. That means the workforce is the last line of defense against phishing. If just one person clicks on one of the messages that get through, it can be disastrous.
In short, the hackers only have to be ârightâ one time. We have to spot and avoid phishing attempts every time. The stakes are very high.
Thatâs why so many employers conduct simulated phishing awareness training exercises.
If your job involves a computer, you may have experienced this kind of training. In these exercises, organizations create a fake email with a link and send it out to the workforce. They track who clicks and who reports the email as a phishing attempt. If you clicked, you may have had to do some extra cybersecurity training. If you reported the phish, you may have even received some type of reward.
Building the Phish Scale
Our colleagues at NIST asked for some help contextualizing the results of our own phishing training, and thatâs how our research project, a method known as the NIST Phish Scale, began. Through years of research, weâve found that there are two major sets of factors that determine whether someone clicks on a phishing email â observable cues and user context.
The observable cues are in the message itself. Users are generally good at spotting red flags, such as typos, a personal email address instead of a business one, a generic greeting, and more. Weâve identified 23 of these cues that can help users decide if a message is legitimate.
The user context has to do with you and your job. Iâm a researcher, so if someone sent me an email to pay an invoice, I could easily spot that as a phish. Thatâs not my job. But if you sent that same email to someone in accounts receivable who pays invoices, it might be harder for them to detect.
We call this concept premise alignment. If the premise of the email matches the recipientâs user context, itâs much harder to recognize it as a phishing attempt.
Premise alignment isnât just about your job. It can also have to do with seasons or whatâs going on in the world. If you sent me an email today, in October, about Valentineâs Day, I would immediately be suspicious. But if you sent that in February, I might be less concerned about it, at least initially.
A phishing email doesnât have to be crafted perfectly for everyone to be effective; it just has to be perfectly crafted for just one person.
In doing our research, we realized this information would be useful for organizations other than NIST. So, weâve made a method based on our research, the Phish Scale, available for organizations conducting phishing awareness training.
The NIST Phish Scale is free to use for academic purposes. For any commercial use, companies will need to reach out to our partnership office for a license.
Our Phish Scale helps organizations understand the results of their phishing training. Maybe a phishing test had a very low click rate, like 5%. Thatâs a 95% success rate of people recognizing the phish. But if the phishing email was extremely obvious, does that really say how well users would respond to a more sophisticated attempt?
Itâs like school. If teachers give a very easy test, they expect the class will do well. If the test is much harder, they donât expect such high grades.
The Phish Scale helps organizations add important context to these results, and they can use that context to improve their training. They can learn things such as just how hard that phishing email was to spot or what context employees are most likely to fall for.
By analyzing their results with the Phish Scale, and adapting their training accordingly, organizations can help their workforce be savvier about phishing and less likely to fall victim to it.
Human-Centered Computing
My background is in human-centered design and human-centered computing. I did my Ph.D. work in this area and have done related research at NIST, including in voting and public safety communications.
While technology can do amazing things, the stories of people who have lost money or personal information to phishing are just heartbreaking to me. That motivates me to keep doing this research; I hope people will benefit from what Iâm learning and take the necessary steps to protect themselves.
In fact, one of my family members nearly fell victim to a phishing scam recently. Thankfully, she realized what was going on before giving away her bank account information. But it was a close call, and many others are not so lucky and lose money to these scams every day.
While my research is focused on organizations training their employees to spot and avoid phishing, I hope employees will use these skills in their personal lives as well. You can be targeted both at work and at home.
Future of the Phish Scale
Phishersâ tactics are always changing, so we have to keep researching to make sure the Phish Scale is as updated and effective as possible.
My team is continuing to research this concept of premise alignment to learn as much as we can to help trainers. Weâre planning to release an updated version of the Phish Scale in the near future.
Iâm also working to expand this research with a broader set of data. So far, weâve worked with data primarily from simulated phishing awareness training exercises internal to NIST. Because so many different types of jobs require phishing training, weâre looking to expand this research to other organizations to see what else we can learn.
Phishing may seem like an overwhelming problem, but thereâs so much we can do to be vigilant and protect ourselves. So in this Cybersecurity Awareness Month, make sure you understand how phishing works and how to protect yourself.
Fight the Phish: Follow These Tips
Itâs Cybersecurity Awareness Month, and while youâre enjoying all things pumpkin and autumn, make sure you remember these important tips to keep your personal (or your employerâs) information safe:
- Always remain vigilant. If you see something suspicious, report it right away.
- When in doubt, donât click.
- Never call the number in a suspicious email. If the email is from a company or an organization, look its phone number up on its website and call that number to check if somethingâs legitimate.
- If you get a message from someone you think you know, especially if itâs asking for money, call them to verify they actually sent it.
- Phishing isnât just for email now. You can get phishing text messages on your phone (smishing) or fraudulent phone calls (vishing) that use similar tactics. Be vigilant in all areas of communication.
Author: Kelly Hall
Last Updated: 1700331722
Views: 1727
Rating: 4.1 / 5 (83 voted)
Reviews: 98% of readers found this page helpful
Name: Kelly Hall
Birthday: 1948-09-10
Address: 073 Chambers Glen Suite 354, Lake Mauriceland, FL 19785
Phone: +3952295224364219
Job: Orthodontist
Hobby: Sewing, Motorcycling, Beekeeping, Billiards, Hiking, Arduino, Bird Watching
Introduction: My name is Kelly Hall, I am a unguarded, strong-willed, treasured, persistent, Precious, resolved, vibrant person who loves writing and wants to share my knowledge and understanding with you.