top of page

Human Touch: Your Best Defence Against Phishing Scams

Phishing scams are relentless and constantly adapting to slip through even the best defences. Recently, Proofpoint’s Email Protection Service, a robust and effective tool, was exploited to send millions of phishing emails. This incident underscores an essential truth: no matter how advanced our tech, the human factor remains crucial. Proofpoint is an excellent tool, yet this event highlights the importance of complementing technology with proactive human vigilance. So, how can you protect yourself without relying solely on technology? Here are some practical tips to bolster your defences.



1. Educate Yourself and Your Team

Knowledge is your first line of defence. Phishing scams are becoming increasingly sophisticated, making it more important than ever to stay informed. Regular training sessions on how to spot phishing attempts can significantly reduce the risk of falling victim to these scams. Look for red flags such as:


  • Unusual sender addresses

  • Generic greetings

  • Spelling and grammatical errors

  • Suspicious links and attachments


These are common indicators of phishing attempts, and recognising them can prevent a potential breach. Encourage a culture of vigilance within your team, where everyone feels responsible for the organisation's cybersecurity. Regular updates on the latest phishing tactics and real-life examples can keep the team engaged and aware.


2. Verify Before You Click

Always verify the authenticity of an email before clicking on any links or downloading attachments. Cybercriminals often impersonate legitimate organisations to trick recipients into divulging sensitive information. If anything seems off, contact the sender through a known, trusted method. This could mean calling the company directly or using a previously established email address rather than replying to the suspicious email. Verification steps might seem cumbersome, but they can save you from significant trouble down the line.



3. Use Multi-Factor Authentication (MFA)

Implementing MFA adds an extra layer of security. Even if your credentials are compromised, an attacker would need a second form of verification to gain access. MFA can include something you know (password), something you have (smartphone), or something you are (fingerprint). This additional step makes it substantially harder for attackers to breach your accounts, providing a strong deterrent against unauthorised access.


4. Regularly Update Your Software

Keeping your software up-to-date is critical in defending against phishing attacks. Software updates often include patches for security vulnerabilities that cybercriminals exploit. Ensure all your software, including antivirus programs and operating systems, are up-to-date. Set up automatic updates where possible, and regularly check for updates for applications that don't update automatically. This practice is a simple yet effective way to close potential security gaps.


5. Be Cautious with Personal Information

Avoid sharing personal or financial information through email. Reputable organisations will never ask for sensitive details in this manner. Be sceptical of emails requesting such information and verify their legitimacy through other channels. It's also a good practice to educate customers and clients about your company's policies regarding information requests to prevent them from being duped by phishing scams pretending to be from your organisation.


6. Implement Strong Password Policies

Encourage the use of strong, unique passwords and consider using a password manager. A strong password typically includes a mix of letters, numbers, and special characters. Using a password manager can help generate and store complex passwords, reducing the temptation to reuse passwords across multiple accounts. The NCSC recommends using three random words to create strong passwords that are both secure and memorable.


7. Monitor Your Accounts

Keep an eye on your bank accounts, credit reports, and other financial statements for any unusual activity. Early detection can prevent significant damage. Set up alerts for suspicious activities on your accounts, so you are immediately notified of any unauthorised transactions. Regular monitoring ensures that if a phishing attempt does succeed, you can take swift action to mitigate the impact.


8. Stay Informed

Cyber threats are constantly evolving. Stay informed about the latest phishing tactics and scams. Websites like the National Cyber Security Centre (NCSC) offer valuable resources and updates. Subscribe to cybersecurity newsletters, attend webinars, and participate in forums to stay ahead of potential threats. An informed and proactive approach can make a significant difference in your overall security posture.


Human Vigilance Complements Technology

While technical controls like Proofpoint are vital, the human element cannot be overlooked. The recent exploitation of Proofpoint’s service highlights that even the best technological defences can have vulnerabilities. However, this doesn't diminish the tool's effectiveness; instead, it emphasises the need for a layered security approach.


Phishing scams often rely on human error. Cybercriminals use social engineering techniques to exploit our natural tendencies to trust and comply. This is why an educated and vigilant user base is one of the most powerful defences against phishing. By combining robust technical measures with proactive human vigilance, you create a comprehensive defence strategy.


Encourage a Cybersecurity Culture

Creating a cybersecurity-aware culture within your organisation is essential. Encourage open communication about potential threats and ensure that employees feel comfortable reporting suspicious activities without fear of repercussions. Regularly update your cybersecurity policies and practices, and make sure everyone in the organisation understands their role in maintaining security.


Use Technology Wisely

While this article focuses on the human element, it's important not to disregard the benefits of advanced security tools. Proofpoint and similar services play a critical role in detecting and blocking phishing attempts before they reach your inbox. Use these tools in conjunction with human vigilance to create a formidable barrier against cyber threats.

bottom of page