• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Every day is Phishing Season!

by CXO Staff
October 31, 2022
in Opinions

Successful phishing attacks provide attackers with stolen credentials that allow them to simply ‘walk into’ your business and gain access to the targets they have set their sights on

Every day is Phishing Season!

If a burglar wanted to gain entry to your home, they could force their way in – perhaps by picking a lock, breaking a window, or some other means.  If a neighbor heard noises or saw strange activity, they might call the police.  This might result in the burglar getting caught, of course.

On the other hand, the burglar could try to convince you to hand over your keys willingly.  Perhaps by posing as a delivery or repair person, or inspector, or by telling a plausible story.  If the burglar can get their hands on the keys, they can simply walk right in – as if they are doing so legitimately, and no one suspects a thing.

In the digital world, phishing is how burglars (cybercriminals) gain entry to your home (your critical systems and sensitive data).  Successful phishing attacks provide attackers with stolen credentials that allow them to simply ‘walk into’ your business and gain access to the targets they have set their sights on.

How come phishing is so effective?  Well, for starters, phishing attacks have evolved significantly in recent years.  Whereas they once were primitive, full of typos, and not particularly convincing, nowadays, even experts have trouble distinguishing phishing emails from legitimate emails.  Phishing sites also look remarkably like the legitimate ones they are designed to imitate.  It is no wonder so many users are fooled into providing their credentials to the attackers. In other words, handing over their keys willingly.

Josh Goldfarb, Fraud Solutions Architect for EMEA and APCJ at F5

As many businesses continue to go through a digital transformation, the use of this method of attack has greatly accelerated, and the resulting damage spreading.  An increased online presence means a bigger online attack surface and risk.  Attackers don’t need to devise complex schemes to force entry into businesses these days – they can merely invest in convincing unsuspecting users to hand over their valid credentials.

That said, what can businesses do to protect their online applications from security and fraud incidents?

Simply rooting out the phishing sites is not enough to combat credential theft.  Attackers can create phishing sites with ease.  When we take one down, another one pops up elsewhere.  This can often devolve into a never-ending battle of attrition that rarely makes our online applications more secure or protects them from fraud.

Instead, if we assume that a certain percentage of our legitimate users will fall prey to phishing attacks and will have their credentials stolen, we can adapt accordingly.  When we shift our perspective and take this approach, we realise that identifying and mitigating security and fraud attacks that result from credential theft becomes one of our main focuses.  Adapting our approach helps us to protect our online applications from the array of phishing attacks that are likely being launched against them on a regular basis.

There are likely many approaches we can take to mitigating risk due to credential theft.  Here are a few of them:

  • Eliminate automation. Attackers build databases of stolen credentials that they amass from a variety of sources, phishing among them.  Those stolen credentials are often tested in bulk using bots.  The credentials that are valid are then often used to commit Account Takeover (ATO) and manual fraud.  Eliminating these automated attacks not only mitigates this risk, it also reduces infrastructure costs going to undesired non-human (bot) traffic.

 

  • Stop ATO. Attackers that can leverage valid stolen credentials to log in to stolen accounts and masquerade as legitimate users can use that access to commit fraud.  This manual fraud, of course, results in losses incurred by businesses that fall victim to these incidents.  Detecting and mitigating Account Takeover (ATO) stops these fraud losses, saving businesses money.

 

  • Reduce friction. Increased risk of fraud often results in businesses instituting more stringent authentication and Multi-Factor Authentication (MFA) requirements.

 

Unfortunately, this approach adds friction for legitimate customers without significantly reducing fraud losses.  Attackers are resourceful, motivated, and adept at finding workarounds.  If we can reliably identify automation and manual fraud, we can also reliably identify desired legitimate traffic.  Once we know the traffic we want, we are less likely to inconvenience legitimate customers and can focus on stopping the attackers instead.

Phishing attacks are here to stay and will likely continue to increase in number.  Fortunately, we have means to combat them. By zeroing in on the risk of credential theft, businesses can focus their efforts on reducing losses due to security and fraud incidents.  While there is no way to mitigate all risk, taking steps to eliminate automation, stop ATOs and reduce friction can ensure that businesses keep a steady stream of revenue from legitimate customers while reducing losses from bots and fraud.

Tags: featured2Josh Goldfarbphishingphishing attacks
ShareTweet

Related Posts

Channel Vision Strategy: Empowering cyber resilience
Opinions

What most businesses get wrong about data security

In today's AI-driven world, vast amounts of data are generated daily across industries like finance, e-commerce, healthcare, and government services....

June 11, 2025
Why private cloud matters
Opinions

Why private cloud matters

As digital transformation accelerates across industries, private cloud has become a vital infrastructure model for organisations seeking the flexibility of...

June 9, 2025

Discussion about this post

Latest Issue

Omnix International launches HOT Systems professional laptops

Omnix International launches HOT Systems professional laptops

June 17, 2025
ServiceNow introduces ServiceNow University

ServiceNow introduces ServiceNow University

June 17, 2025
SentinelOne accelerates secure cloud migrations for AWS customers

SentinelOne accelerates secure cloud migrations for AWS customers

June 16, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.