sb-nz logo
Story image

Crowdsourced phishing protection eliminates threats in under 13 minutes

18 May 2016

IronScales, a cybersecurity provider that crowdsources phishing protection, has reported that training designated staff in an organisation to detect and report threats as they are found can quickly eliminate threats.

According to the company, this method of phishing prevention has reduced clickthrough rates to malicious content by 90%, while detections are occurring nine times faster. Reporting of threats occurs less than two minutes after detection and threats can be totally eliminated in under 13 minutes.

The crowdsourced technology relies on designated staff to identify threats and act accordingly, after going through the training process.

This, the company says, is a rapid improvement to results from before training even begins, where up to 40% of users click on a sample phishing email.

Eyal Benishti, IronScales CEO, says "phishing is an insidious, constant threat to enterprises,” IronScales CEO Eyal Benishti said. “Organisations need to take a proactive approach to make sure it becomes a far less successful channel of attack.”

According to a study by SANS, 95% of all enterprise attacks are caused by spear phishing, and that coupled with a reported increase of spear and whale phishing attacks means that companies need to prepared when mistakes happen and information is leaked.

Companies could lose up to $4 million in funds, a study by Ponemon Institute says.

The importance of cyber security has never been more important, particularly as customers become more critical of brand images in every area from loyalty, reputations, profit potential and the threat of customer information hacks, IronScales says.

According to IronScales, a focus on threat prevention, threat detection and threat management should be part of every company’s security system.

Link image
Webcast series: The necessary tools to secure a remote workforce
Experts from across the A/NZ region discuss the best security practices in a remote working world - with sessions available on the first Thursday of every month.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Link image
DevOps teams struggling to achieve enterprise scale - tips for enablement
Christian Oestreich, a senior software engineering leader with experience at multiple Fortune 500 companies, shares how a metrics-driven mindset can dramatically improve software quality and enable DevOps at enterprise scale.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
Fortinet SOARs to new heights of protection on the wings of AI & automation
Jon McGettigan, Fortinet A/NZ Regional Director, talks about SOAR (security orchestration, automation and response) and explains that effective SOAR starts with your security policy.More