Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Five lessons everyone needs to learn about phishing attacks

By Zack Schuler
phishing-email-freepik.jpg
September 22, 2021

Despite the cliche image of the hooded hacker ensconced in an underground base, furiously breaking through firewalls and other digital security mechanisms, the reality of cybercrime is often much less dramatic. The vast majority of cyberattacks rely on some form of digital communication, such as email or texts, which contain malicious content. Once opened, this content allows the attacker to access secure systems, steal money and identities, and so on. 


This broad category of cyberattack is known as social engineering – the deception and manipulation of human beings in an effort to convince them to willingly provide sensitive information or click on a corrupt link. And among all the forms of social engineering out there, phishing is by far the most common. Phishing functions exactly as its name implies: cybercriminals send malware to an account in the form of an email attachment or a link to a compromised website, and once they “catch” a victim, they gain access to private accounts. 


Considering the ubiquity of phishing attacks, any cybersecurity platform has to put them front and center. With that in mind, here are the top five things you need to know about phishing. 


1. Phishing is the most common cyberattack. 


According to the FBI, there were more than 241,000 reported victims of phishing in 2020 – a number that’s almost two and a half times larger than the second-most-frequent type of attack. There are several reasons phishing is one of cybercriminals’ go-to tactics: first, the barriers to entry are low, as phishing doesn’t require much technical expertise. Second, phishing works, costing people tens of millions of dollars every year. And third, phishing allows cybercriminals to attack a large number of targets at once. 


Many victims of cyberattacks don’t report these crimes to the FBI or any other agency, so the number cited above is almost certainly a significant underestimate. 


2. Phishing attacks exploded during COVID-19. 


The COVID-19 pandemic was a bonanza for cybercriminals. Millions of people suddenly lost their jobs, misinformation became rampant, and fear surged as the virus rapidly spread around the world – an ideal environment for scammers to hook victims with fake government alerts and health information, fraudulent offers of remote work, and even requests for donations to phony healthcare charities. A study by F5 Labs found that phishing attacks increased by 220 percent as anxiety about the pandemic reached its peak. 


The influx of phishing attacks amid the pandemic is a reminder that cybercriminals are always adapting to new circumstances. Phishing is an especially versatile type of cyberattack, which means employees should always be on their guard – especially during a crisis like COVID-19 or an economic downturn. 


3. Employees are especially susceptible to phishing attacks. 


One of the reasons phishing is such a pervasive and destructive type of cyberattack is the fact that it exploits universal psychological vulnerabilities. A 2017 study of phishing attacks found that the email subject lines which convinced victims to click were often coercive, such as (ironically) “Official Data Breach Notification,” “Your Password Expires in Less Than 24 Hours,” and “Please Read Important from Human Resources.” Cybercriminals who launch phishing attacks frequently attempt to intimidate victims by speaking from a position of authority or presenting themselves as representatives of a legitimate entity. F5 Labs found that 55 percent of phishing sites used recognizable brand names and identities in their URLs. 


These are all reminders that cybercriminals know which psychological buttons to push, which is why it’s no surprise that phishing attacks work over and over again. 


4. Phishing attacks are often successful.


When PwC ran a simulated phishing attack on financial institutions, 70 percent of the emails were delivered, and 7 percent of users clicked on the malicious links. Considering the fact that it only takes a single breach for a cybercriminal to steal sensitive information, leak or sell that information, and cause irreparable harm to a company’s reputation, this proportion is far too high. According to Verizon’s most recent Data Breach Investigations Report, phishing was involved in a quarter of all breaches in 2019 – a proportion that shot up to 36 percent last year.


IBM reports that the average cost of a data breach is $3.86 million, while it typically takes 280 days to identify and contain these breaches. It has never been clearer that companies need to teach their employees how to spot and prevent phishing attacks. 


5. Phishing attacks can be prevented.


Despite the fact that phishing attacks seem to be rising inexorably, there are plenty companies can do to avoid becoming victims. When employees are taught which warning signs to look for, they’re capable of recognizing when an email or any other digital communication is likely a phishing attack. When the Department of Homeland Security audited one of our clients (which provided employees with cybersecurity awareness training since 2016), it launched a simulated phishing attack to see how employees would respond. While 600 employees were tested, only one fell for the attack. 


What makes phishing so attractive to cybercriminals is its accessibility – anyone can send a fraudulent email. Although some of these emails contain malware, many simply ask directly for login credentials or sensitive account information. This is a reminder that the first and last line of defense against phishing is always employees themselves. 

KEYWORDS: cyber security malware phishing risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zack Schuler is the founder and CEO of NINJIO.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Laptop and monitor

    Frontline lessons: What cybersecurity leaders can learn from attacks

    See More
  • healthcare security freepik

    Healthcare + Security: Why it needs to matter to everyone

    See More
  • lessons-ideas-freepik1170x658.jpg

    Security lessons to learn after the Uber data breach

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing