Understanding Phishing and Protecting the 8th Layer

Contributed by Anthony Ralston

This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure their effectiveness. The paper will look at the traditional measurements matrix based on clicks and credential harvesting. Moreover, this paper will look at cultural, quality of phish, work environment, and other factors to establish a larger picture of the risk to a company from phishing attacks. It is hoped that this paper will serve as a closer consideration what it takes to measure and protect users from phishing attacks.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 5 (1 vote)

Comments

I enjoyed reading this article. It really helped me understand phishing.