{"id":6050,"date":"2020-06-04T23:04:48","date_gmt":"2020-06-04T22:04:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6050"},"modified":"2021-04-08T23:06:53","modified_gmt":"2021-04-08T22:06:53","slug":"why-phishing-succeeds-and-how-keep-your-customers-safe","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe","title":{"rendered":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe"},"content":{"rendered":"<p>Email attacks have been one of the top methods of attacking users online for years. Many people think they won\u2019t fall victim. However, these attacks haven\u2019t stopped\u2014they continue each year because they\u2019re successful. Today, we\u2019ll talk about some of the reasons why these threats succeed and what you can do to help prevent them.<\/p>\n<h3>Statistics<\/h3>\n<p>In sales, numbers become predictable over time. For a given salesperson, they may know that out of every 10 customers they call, they can expect to close one or two. If they want to hit their quota, they make a certain number of calls and they know that, on average, they will hit their quota.<\/p>\n<p>The same applies to phishing. A small percentage of people will fall victim to a phishing scam. Perpetrators need only send out a lot of emails, and a few people will click. This can make any given phishing campaign profitable. Plus, emails can be low cost to send and don\u2019t usually require a ton of technical know-how to pull off.<\/p>\n<p>Additionally, criminals can improve their success rates by doing some reconnaissance. In some cases, it could be a sophisticated\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/use-cases\/spear-phishing-prevention\">spear-phishing attack<\/a>\u00a0targeted at an executive using information they gleaned using open source intelligence techniques. Or it could be simpler\u2014they could email blast an organization with an email that appears to come from the personal email of the CEO with an \u201curgent request.\u201d Either way, these can improve their success rate and make them even more successful with their email campaigns.<\/p>\n<h3>Lack of training retention<\/h3>\n<p>User security training is essential for reducing your customers\u2019 email security risks. It\u2019s important to teach users what to look for in spam or phishing emails, like misspellings, out-of-character requests, or time pressures like being asked to approve an invoice within an hour.<\/p>\n<p>However, email attacks can succeed despite this because training doesn\u2019t always lead to behavioral change. Employees may zone out during in-person trainings. Others may need to receive information in a specific way\u2014written, visual, or hands-on training. Many employees won\u2019t retain the information for the long term. Training can reduce the overall risk, but it\u2019s not a silver bullet.<\/p>\n<p><b>Note:\u00a0<\/b>You can further reduce the risk a customer will forget important information by offering them follow-up resources like an infographic, poster, or email send that reiterates the important points from your user training. Periodic refreshers can also help.<\/p>\n<h3>Attention<\/h3>\n<p>Perhaps one of the biggest factors in successful phishing attempts is attention. This focuses on two dimensions.<\/p>\n<p>First, people pay attention to relevant information. If the news is dominated by a major story, a scammer can exploit this natural curiosity to hook peoples\u2019 attention. For example, if the government offers a new home loan program and it\u2019s widely publicized, scammers can use this information to trick people into giving away important personal information or user credentials to learn more. People are already primed to pay attention to a relevant email, so scammers can often take advantage.<\/p>\n<p>Second, people often have moments of split attention. When this occurs, people have their guards down, making them less likely to recognize a scam. For example, imagine a manager at a small business who just finished an exhausting project, had to have a sensitive conversation with an employee earlier, and has been pinged by text messages from their family all day. If they have to sort through dozens of emails before they can close their laptop for the day, they\u2019re likely emotionally drained enough to miss a few details. That error could be costly, but it\u2019s certainly human.<\/p>\n<h3>Prevention<\/h3>\n<p>Ultimately, phishing scams work because humans make mistakes. You can reduce their risk by offering strong user training, but one or two people in an organization may forget that training when they need it (although, this is no excuse not to offer security training). And of course, it only takes one or two clicks in an organization to potentially cause a breach.<\/p>\n<p>That\u2019s why you shouldn\u2019t rely on any one tool to fight back against cybercriminals. Instead, it\u2019s important to use multiple layers\u2014even within your own email security\u2014to help prevent these attacks from taking hold. Humans need to continue doing their part, but technology should play a role.<\/p>\n<p>For instance, it makes sense to add an additional email security gateway on top of any existing email program your customers use. While many email programs offer some level of security, it\u2019s often insufficient\u2014adding another check on top can go a long way toward reducing the overall number of threats reaching individuals\u2019 inboxes. This means your security can rely less on fallible humans.<\/p>\n<p>Additionally, it\u2019s important to realize that email usually represents only one phase of an attack. Having other security layers in place like endpoint protection to detect malware and fileless attacks, backup for restoring data if it gets encrypted, and frequent patching can help you round out a security strategy for your customers.<\/p>\n<p>Ultimately, phishing attacks continue because they succeed and are profitable for cybercriminals. Yet, if you have the right technology in place to supplement the human element, you can help greatly reduce your customers\u2019 risks.<\/p>\n<p><strong>One of the best ways to help reduce email attacks is to have a strong\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security\" target=\"_blank\" rel=\"noopener\">email security solution<\/a>\u00a0in place. SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure is built to help MSPs protect their customers from email attacks. It uses collective intelligence from its entire user base to protect customers against even emerging attacks. For example, if some of its user base sees a specific scam occurring based on a news event, it can flag that and help prevent it from reaching the inboxes of other users. Additionally, it\u2019s compatible with nearly any email solution including Microsoft 365. Learn more by starting a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail-assure\/trial\">free trial today<\/a>.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6050","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able<\/title>\n<meta name=\"description\" content=\"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able\" \/>\n<meta property=\"og:description\" content=\"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-04T22:04:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T22:06:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe\",\"datePublished\":\"2020-06-04T23:04:48+01:00\",\"dateModified\":\"2021-04-08T22:06:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\"},\"wordCount\":981,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\",\"name\":\"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2020-06-04T23:04:48+01:00\",\"dateModified\":\"2021-04-08T22:06:53+00:00\",\"description\":\"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able","description":"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe","og_locale":"pt_BR","og_type":"article","og_title":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able","og_description":"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-06-04T22:04:48+00:00","article_modified_time":"2021-04-08T22:06:53+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe","datePublished":"2020-06-04T23:04:48+01:00","dateModified":"2021-04-08T22:06:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe"},"wordCount":981,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe","url":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe","name":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2020-06-04T23:04:48+01:00","dateModified":"2021-04-08T22:06:53+00:00","description":"Email-based attacks have been with us for a long time. This blog looks at how MSPs can help their customers make sure they are prepared.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/why-phishing-succeeds-and-how-keep-your-customers-safe#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Why Phishing Succeeds\u2014and How to Keep Your Customers Safe"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6050"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6050\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}