Email phishing attacks have been a persistent cybersecurity threat for years â and this is rapidly evolving. According to IBMâs Security Report, the threat rose at a staggering rate of 202% in the second half of 2024, driven by AI and increased email usage.Â
To understand this alarming trend, we spoke with Sam an Account Manager for cybersecurity firm Pentesec, a sister company of Symity.
We explore the evolution in email phishing and detail steps you can take to protect your enterprise.Â
AIâs Dual Role in Email SecurityÂ
AI is a major driver in the increased phishing threat, making it easier to create convincing emails. The rise of remote work during the COVID-19 pandemic has also contributed, as email has become the preferred communication method for many organizations, opening users to further vulnerabilities. Â
âAI is a huge driver behind the increase in phishing attacks. It makes it far more accessible for attackers to create mass emails that look more human than ever before.â â Sam, PentesecÂ
However, the targets of these attacks are often not the IT teams tasked with security. âThe target is your day-to-day users â the insurance sales guys, the marketers â not the people who understand the ins and outs of security,â said Sam. This disconnect means many employees struggle to identify sophisticated phishing attempts.Â
Sam noted that while regulations like GDPR have helped improve security in some sectors, the challenge of email threats remains difficult to regulate. âYou canât avoid it â as long as I have your email address, I can send you an email from wherever I like.âÂ
The experts agreed that a multi-pronged approach is needed. Organizations should start by evaluating their current email security tools and policies. âCome talk to us, and we can do a 14-day validation to show you whatâs getting through and what we can stop,â Sam suggested.Â
Organizational Approach to Email SecurityÂ
Sam detailed his suggestions for how organizations should approach email security, recommending:
1. Start with understanding current protections and their effectiveness Â
Do you have a dedicated tool? If so, Bourike recommends: âEvaluate that, understand what itâs doing, how well itâs working, and then Iâd say just be open to what the market has to offer.â
2. Consider trials of advanced tools for validation and gap analysisÂ
Some tools have free trials, including a 14-day trial for Check Pointâs Harmony Email Security Solution
3. Foster a security-aware culture through regular training and risk communicationÂ
Creating a security aware culture is key â one person cannot operate safely in a vacuum. âTraining your staff regularly and highlighting the risks is key to building that internal security culture,â emphasizes Sam.Â
From a global lens, he adds: âI think security is a culture and people have different beliefs around that depending on where you are how you were brought up how you were introduced into the industry.â He sees huge variations in approaches between countries, noting that the UK is quite advanced while places like the Netherlands are only just taking security seriously.Â
4. Implement strict policies on device usage (corporate vs. personal)Â
More flexible working patterns have heightened the challenge of keeping an overview of employeesâ overall device usage. Workers operating from home or in hybrid patterns may switch between corporate and personal devices â particularly as some companies expect an âalways onâ culture. Â
Sam recommends being a âlittle bit cutthroatâ and asserting to employees: âif youâre going to access organisation data then you need to be doing it on a corporate laptop or a corporate mobile.â They can back this up with configurations that block access to corporate data from personal devices.Â
5. Recognize security as an essential âinsurance policyâ for data protectionÂ
Bourike recommends that companies view security as an expensive but necessary insurance policy: âat the end of the day itâs the most important insurance policy that an organisation could deploy because that data is the most valuable thing to an organisation.âÂ
As the threat of email phishing continues to evolve, organizations must remain vigilant and proactive in their approach to cybersecurity. The experts agree that a comprehensive strategy combining advanced security tools, like Check Pointâs Harmony Email Security solution, and a strong culture of security awareness is essential.Â
âSecurity is a cat and mouse game â you have to be right 100% of the time, while the attackers only need to be right once,â said Sam. âThatâs why itâs so difficult, and why security will always be a constant challenge.âÂ
By empowering employees to recognize and report suspicious emails, and deploying robust email security measures, organizations can better defend against the rising tide of phishing attacks. With the right combination of technology and human awareness, businesses can stay one step ahead of cybercriminals and protect their most valuable assets.Â