






In 2021 83% of organizations reported instances of phishing, almost doubling from the previous year.
A successful phishing attack on a company can have devastating and long-lasting impacts. These can include revenue loss, reputation damage, intellectual property theft, data leaks, and decreased overall company value. In addition, a company can suffer significant financial penalties after the fact. There could be hefty fines issued by regulatory agencies if it is found that a company acted carelessly with customer data and customers can file civil lawsuits for any damages they experience as a result.
Thankfully there are ways a company can take steps to protect itself from these dangers.
Phishing is when an attacker sends a fraudulent message, usually by email, designed to look like a legitimate communication and with the intent of tricking the recipient into taking an action that benefits the attacker. This can either happen by revealing personal information (like passwords or credit card numbers) or by clicking a link that is not safe.
A skilled criminal can now create phishing emails that are almost indistinguishable from their official counterparts. However, it doesn’t stop at just emails. As technology has continued to evolve, so have the types and sophistication level of phishing attacks.
Some other common phishing types you may be familiar with:
The number of reported cybercrimes involving Phishing has increased exponentially each year since their invention and shows no sign of slowing down in the future.
According to Verizon’s 2022 Data Breach Investigations Report, approximately 20% of all data breaches involve phishing by email and social actions. In the Anti-Phishing Working Group’s (APWG) Phishing Trends Report for the first quarter of 2022, there was a record number of attacks at over 1 million. Nearly a 15% increase in the number of instances from the previous quarter and the highest single quarter number ever recorded by APWG. An additional comparison between the FBI’s 2019 and 2021 annual reports published by the Internet Crime Complaint Center (IC3) shows that the number of reported instances of cybercrime involving Phishing increased by almost 200% in just two years.
It is important to remember that these reports can only include instances of phishing that are actually reported. The Department of Justice estimates that only 1 in 7 cybercrimes get reported, which means that approximately 85% of cybercrimes go unreported, or worse, undetected.
With the number of fishing attacks constantly growing and cybercriminals becoming more brazen, it is no longer a question of whether or not your company will be targeted. It is a question of when it will happen. The current state of cybersecurity training most companies provide to employees is not doing enough to help them avoid falling victim to phishing attacks and many companies are cutting corners on essential security measures that could protect them and their customers.
Some numbers to think about:
As the sophistication of fraudulent Phishing communications continues to evolve even the most well-trained employees will still make the mistake of clicking on a phishing email from time to time. When this happens, you need a way to recognize it and stop the following attack before it causes irreparable damage. While firewalls may prevent systems on your network from communicating with some IP addresses you deem dangerous, their usefulness has limitations in these situations.
This is where an IP threat intelligence tool based on reputation can step in and save your company from suffering devastating long-term consequences.
An IP threat intelligence tool monitors network traffic in real-time and provides full visibility of every connection made on the network. When paired with AI and a complete historical library of reputation-based IP records, it uses hundreds of factors to instantly identify malicious or unknown connections in a network. It takes to take the guesswork out of knowing if a connection is a threat so you can stop an attack in its tracks.
If you’re not using an applied IP reputation-based threat intelligence tool in your cybersecurity tool stack you are selling your company short.
There are roughly 3.4 billion IPs that have such poor reputations that no company should ever communicate with them. Our team at Intrusion has shown many companies how their networks are regularly connecting to dangerous IPs, even when they thought their firewall would protect them from these types of threats.
Please contact us if you’d like to learn more about how Intrusion can help protect your business.