2023 Phishing Benchmarking Results For Asia

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

2023 PHISHING

BENCHMARKING Report for Asia


By Jacqueline Jayne, Security Awareness Advocate
for the Asia‑Pacific region for KnowBe4
With the root cause of the majority of data breaches being training that reduces
traced to the human factor, security leaders who continue their human attack
to invest solely on technology-based security layers run surface.
the risk of overlooking a best practise proven to reduce
To assist geographical regions with
their vulnerability: security awareness training coupled
evaluating their PPP and understanding
with frequent simulated social engineering testing. This
the implications of their ranking, KnowBe4
approach both helps raise the readiness level of humans
conducts an annual study to provide definitive
to combat cyber crime and lays the critical foundation
Phish-prone benchmarking across small, medium and
necessary to drive a strong security culture.
large organisations by geographical regions. This guide
With geopolitical changes affecting the dynamics of cyber provides an overview of the key findings for Asia.
crime, organisations ought to reduce their single biggest
cyber risk: the human element. Cybercriminals are counting 2023 Global Phishing By Industry
on your employees lacking the necessary knowledge, Benchmarking Study
attention and energy to trick them into making bad security
decisions. One over-stressed, distracted, or daydreaming Though every organisation would like to understand
employee is all you need to let the bad actors in. how they measure against the rest in their industry and
geography, the comparison requires robust data coupled
Security leaders need to know what happens when their with a scientific, proven method to produce valid results. To
employees receive phishing emails: are they likely to click provide a nuanced and accurate answer, the 2023 Phishing
the link? Get tricked into giving away credentials? Download By Industry Benchmarking Study analysed a data set of over
a malware-laced attachment? Will they simply ignore the 12.5 million users, across 35,681 organisations, with over
email or delete it without properly notifying their security 32.1 million simulated phishing security tests, across 19
team? Or will they report the suspected phish and play an different industries and seven geographic regions.
active role in the human defence layer?
All organisations were categorised by size and geographical
Each organisation’s employee susceptibility to these region. To calculate each organisation’s PPP, we measured
phishing attacks is known as their Phish-prone™ Percentage the number of employees who clicked a simulated phishing
(PPP). By translating phishing risk into measurable terms, email link or opened an infected attachment during a
leaders can quantify their breach likelihood and adopt testing campaign using the KnowBe4 platform.

In our 2023 report, we continue to look at the following three benchmark phases:

PHASE ONE PHASE TWO PHASE THREE


If you have not trained What is the resulting PPP What is the final resulting
your users and you send a after your users complete PPP after your users
phishing attack, what is the training and receive take ongoing training
initial resulting PPP? simulated phishing security and monthly simulated
tests within 90 days phishing tests?
after training?

To do this, we monitored employee We answered this question by finding To answer this, we measured security
susceptibility to an initial baseline when users completed their first awareness skills after 12 months
simulated phishing security test. training event and looking for all or more of ongoing training and
From that established set of users, simulated phishing security events simulated phishing security tests,
we look at any time a user has failed a up to 90 days after that training was looked for users who completed
simulated phishing security test prior completed. training at least one year ago, and
to having completed any training. took the performance results on their
very last phishing test.

You might also like