Sans Ebook Phishing Benchmark
Sans Ebook Phishing Benchmark
Benchmarking
your Phishing
Awareness
Program
When orchestrating any
security awareness program,
it is only natural to try to gauge an organization’s overall security position against
a jury of one’s peers, so to speak – that is, measure success against comparable
organizations and programs. The growing need to benchmark these programs
has created a bit of a flurry over benchmarking methodologies of late within
the phishing arena, particularly given the absence of industry standards on
everything from program maturity to awareness tools and phishing templates.
This eBook addresses benchmarking and examines what to keep in mind when
using external or internal benchmarks to assess your phishing program. We
will cover which variables to consider while creating benchmarks, and what
to look for when comparing your results across industries. We’ll also cover
global and internal benchmarking as well as concepts such as tiering.
01 What Is
Benchmarking?
What is a benchmark, anyway? And how many variables
need to be similar for the benchmark to be valid, or
even make sense? According to Bernard Marr & Co.,
benchmarks are reference points that can be used to
compare your performance against the performance
of others, typically across internal business entities or
external competitors. Business processes, procedures, and
performance analytics are compared taking into account the
best practices and statistics from similar organizations.
Researched Targets
Data Entry Data Entry Data Entry Data Entry Data Entry
Reply-to
Simulation Key Simulation Key Simulation Key Simulation Key Simulation Key
Impersonal Recognizable Branding Recognizable Style Personalized Highly Personalized
Poor Grammar Not Business-related Business-related Conveys Prior Knowledge Cloned Email or Spoofing
Using our new tracking feature, you can now view all the ecards received by you in the last 30 days.
Kind Regards,
Application Admin
In all cases, it is imperative for the workforce
to have had exposure to security awareness
and training materials. This would not be
appropriate if there were many new employees
who were just issued a new device and had
yet to receive awareness materials.
While the prior example was based on a situation, Subject: Authentication Confirmation
As a key player with elevated privileges, the O365 Security / Email Team now requires
quarterly confirmation of your authentication details. Please access your account information
as soon as possible, you will receive verification once endorsed.
How your stakeholder, management, and leadership teams handle • Parallel management levels, such as directors or associates
security awareness is also a factor to consider when assessing internal
Your security teams can also provide suggestions on target groups to
benchmarking data. The hope is that all levels of managers and
benchmark, as those teams often have the resources to pinpoint the
stakeholders – including Human Resources, Communications, or IT –
most vulnerable employees. In addition, your historical data derived
recognize the importance of improving and enhancing cybersecurity and
from your phishing program can uncover weak departments, teams, and
social engineering skills. However, the background of leaders, organizational
other areas that would benefit from additional training opportunities.
priorities, and limited resources can impact that focus. A remote field
supervisor might feel differently about proper cyber behavior than an
IT leader, and dedicated program managers faced with tight schedule
deadlines may not promote security awareness as much as they should.
CONCLUSION
How to Benchmark
Your Security
Awareness Program
Benchmarking is an important undertaking for many facets of an
organization. Your cybersecurity awareness program is no exception,
as this eBook has shown. This is especially true if your program
is not delivering expected results. Benchmarks allow you to more
easily identify areas to reduce human risk to manageable levels.
While it is tempting to quickly compare your program to those of
competitor organizations based on intuition or limited research, the
pragmatic, step-by-step approach outlined in this eBook will drive
more meaningful results and a more successful phishing program.