The true cost of phishing and security breaches doesn’t just lie with the cost of the actual breach itself.
The true cost of phishing and security breaches doesn’t just lie with the cost of the actual breach itself. In an enlightening report posted recently by Osterman, the direct cost of phishing can be extrapolated to include not only the hourly cost of a phishing attack, but also how much one phishing email can cost. It’s a fascinating—and jaw-dropping—look into the true costs of email cybersecurity.
The report, which was commissioned by Ironscales and conducted by Osterman, was able to figure out both the hourly cost of a phishing email and ever the per-email cost of each phishing or malicious email. They did this by interviewing 252 IT individuals in the United States. They factored in the average salary of each IT professional surveyed, and found that the total amounted to $45,726 annually.
Each single email based attack can cost $31 in labor if the email takes up 27 minutes (the average amount of time spent on each malicious email caught by IT). The cost goes up to $85.33 per email if the length of time is increased to 60 minutes.
70% of those surveyed said that they spent about 31 to 45 minutes dealing with each singular phishing message, and that overall the mitigation of phishing emails takes up about 1/3 of their working day.
Extrapolating that data further, Osterman found that mid-size companies with five IT professionals currently spend $228,630 yearly on email-based attacks alone. For enterprise-sized companies (i.e. ones with 25+ IT professionals), phishing can cost $1.1m annually, based on Osterman’s surveyed U.S. national average for IT professionals.
Adaptive techniques: Often called 'polymorphic phishing’, adaptive phishing attacks use spoofing techniques and sometimes logo kits in order to appear very similar to existing coworkers and employee-recognised login pages. 42% of all malicious emails in 2020 used polymorphic techniques.
Compromised credentials: Hackers obtain compromised credentials either through the dark web or from previously successful phishing attacks. Since these emails often originate from inside the company, it is difficult to detect malicious activity using traditional filtering software.
Obfuscation: This amounts to hiding various keywords, code, and other miscellany within emails so that they bypass existing email security software. Techniques include but are not limited to: zero-point font, brand impersonation (which is similar to logo kit impersonation but exists solely within emails), and more. Check out an informative article from Microsoft about these new techniques here.
Amongst the 252 IT professionals surveyed,
Security and risk management leaders need to move on from relying solely on legacy security awareness programs (such as the one in-built into Microsoft 365) and start focusing more intently on building a more holistic, people-first cybersecurity culture.
Hoxhunt's Threat Analysis Team examines tens of thousands of reported phishing emails a week and have captured tens of millions of threats to date. Working together with our powerful machine learning model, they cluster the threats, rate them, and incorporate the truly harmful ones into our training simulations in real time to ensure our training stays at the cutting edge of the constantly-evolving threat landscape. Hoxhunt users are thus equipped with the habits to outsmart the latest actual threats that have outfoxed email filters, removing potentially catastrophic threats from your system. Learn how to equip your employees with the awareness training that will protect your company from phishing scams.