Online, e-commerce and mobile fraud are on the rise, according to RSA, with 41% of successful attacks enabled by phishing scams.
According to RSA’s Quarterly Fraud Report: Q2 2018, cybercriminals are leveraging phishing scams to obtain banking credentials, credit card details, and even control over mobile devices in an effort to commit fraud.
These attacks are the basis for fraud committed via e-commerce transactions and online banking payments, raising concern for mobile phishing attacks.
Canada and the United States top the list of target countries, with the average fraud transaction hovering at just under $450 – nearly double that of the average genuine transaction.
Part of the success attackers are enjoying is due to their work get better at imitating legitimate links, spoofing email addresses, writing credible email messages, and mimicking websites – all necessary to fool victims enough to convince them to part with their banking credentials and/or credit card details.
RSA ends the report making the case that we’ve moved from a cash- and human-present transaction society to a cash-not present (credit card), card-not-present (card details online), and even human-not-present (automated payments) society.
Because of the impactful nature phishing attacks have on enabling cyber fraud, it’s critical for your users to be “present” from a security standpoint. They must be educated through new-school Security Awareness Training to ensure they are up to speed on tactics used to obtain logon, personal, and credit card details, and to reduce the risk of falling victim to an attack.
Free Phishing Security Test
91% of successful data breaches started with a spear phishing attack
Would your employees click on a phishing mail? We help you train your employees to better manage the urgent IT security problems of social engineering, spear phishing and ransomware attacks. Take the first step now. Find out what percentage of your employees are Phish-prone™ with our free test.
PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser: