The modern workplace is a melting pot. If you think of all the people in your ‘office’; whether it’s virtual or otherwise, it’s likely that in some cases the only common thread you have with your colleague over the cube wall is that you work at the same place.
The workplace of today is more diverse, more educated, and more equitable than it has ever been (though we have a way to go yet). Lots of unique personalities and perspectives are brought together daily with a shared goal – to further to commercial interests of the company, or to fulfill the mission of their non-profit.
To herd all of their respective cats in the same direction, organizations try to create a common set of guidelines through mission statements, quality policies and cultural norms. A one size fits all policies blanket the workplace. The conformity further extends to the common tool-set of the 2019 worker, and along with your corporate PC, your corporate pen and your business cards, everyone gets their very own email.
WORKPLACE EMAIL
Creating email communications policies is hard enough. I once received an email from a senior member of management chastising the entire workforce for a stolen slice of pizza! But securing an organizations email accounts is exponentially more difficult to manage. Email hacking does occur (think SONY) and is often brutal in its impact on reputation and the bottom line. But the reality is the most significant dollar drain from email fraud is not a hacked system; it’s the people in your email user community. Annually in the US alone, otherwise competent and thoughtful employees lose hundreds of millions of dollars via email phishing attacks.
The human element Is the weakest link in the IT security portfolio. Email can’t be switched off or be manually redirected or censored, it is a fundamental ‘inter’ and ‘intra’ company communication tool, without it, commerce – as we know it – would stop.
It is incumbent then on the IT security professional to consider his/her options carefully when deploying email security and email fraud prevention safeguards. Phishing simulators and awareness training is important but is often done infrequently and is easily forgotten in the hustle and bustle of a stressful workday.
3 MAJOR SIMULATION SHORTFALLS
Phishing simulation has gained prominence in recent years as a methodology to stress test an email community’s aptitude for phishing detection. Some of the more feature rich phishing simulators can be configured to target specific groups within an organization and content and timing can be tailored for maximum effect. While a novel idea, the true value of these tools is hard to measure.
At INKY we’ve even seen situations where an IT security team have become so good at creating fake email fraud attempts that their organization starts reporting phantom phish and every email begins finding its way to IT for a safety check.
THE INKY DIFFERENCE
At INKY, we have created a better way. INKY’s Phish fence doesn’t simulate phishing or email fraud; it prevents it. INKY assesses every email received by your organization. With a typical setup time of fewer than 2 hours, INKY is fully compatible with existing SPAM and Malware filters and provides email recipients with a banner - itself a direct non-invasive analysis of each email’s content - serving as both a deterrent and an inline awareness training for the end user.
Our platform is in a constant state of evolution, deploying machine learning and artificial intelligence algorithm’s combined with advanced computer vision that can discern even the most cleverly rendered phishing iconography.
Your employees are best supported by an email fraud prevention platform that recognizes that each email is as unique as they are. Email accounts place a massive amount of risk in the hands of every employee, INKY eliminates that risk and turns even the most tech-challenged associate into a key player in your email security posture.
See if you have been Phished. Take the INKY Phishing Fitness Test.
INKY – Phight Phish