Preventing Cyberattacks and Data Breaches via Employee Awareness Training and Phishing Simulations

One of the findings in Verizon’s most recent Data Breach Report is that stolen credentials are the root cause of data breaches 80% of the time. The most common attack vector of cyber criminals for stealing user credentials is phishing: A targeted campaign of e-mails designed to fool users into surrendering their network login credentials or opening malicious software. These e-mails simulate legitimate communications that users sometimes see including password resets, surveys, and Excel attachments. Once a user opens a malicious attachment or enters their credentials, the network has most likely been compromised.

While most e-mail filters are very adept at catching these and deleting them prior to reaching a recipient’s inbox, some still make it through. Cyber thieves are continuously honing their tactics and e-mail structure to appear authentic and trick e-mail filters into believing they are real. Once a malicious e-mail reaches a recipient’s inbox, they are one of the last lines of defense.

Many organizations do not have a cybersecurity awareness program in place to ensure that employees and contractors are educated about cybersecurity threats, their role in preventing attacks, and how to recognize a malicious e-mail. Most also do not have measurable data about employee diligence when confronted by a phishing campaign. These two elements are essential to an effective cybersecurity strategy but are often overlooked in preference of traditional preventative security measures (firewalls, anti-virus, vulnerability scans, etc.). Preventative measures, however, can only go so far: Once those layers of defense have been breached (especially by a phishing campaign), employee diligence is all that stands between the hacker and your network.

We highly recommend that organizations perform employee and contractor cybersecurity awareness training, both as part of onboarding and on an annual basis. Additionally, periodic phishing simulations should be performed to assess employee diligence and to further educate them on the risks of opening suspicious e-mails. Schneider Downs offers both of these services and has found them to be highly effective in reducing (or eliminating) malicious e-mail infections. Prior to training we find that users open targeted phishing e-mails at a rate of 15% or greater. Once users have been trained that rate drops to almost zero.

Our technology professionals can help you craft a cybersecurity awareness training program (and deliver it if desired) and assess the security posture of your organization through phishing campaign simulations and network security assessments. Such efforts will go a long way in preventing data breaches. For more information on how to properly manage cybersecurity risks and network security, please contact Chris Debo of Schneider Downs by phone at 614-586-7108.

You’ve heard our thoughts… We’d like to hear yours

The Schneider Downs Our Thoughts On blog exists to create a dialogue on issues that are important to organizations and individuals. While we enjoy sharing our ideas and insights, we’re especially interested in what you may have to say. If you have a question or a comment about this article – or any article from the Our Thoughts On blog – we hope you’ll share it with us. After all, a dialogue is an exchange of ideas, and we’d like to hear from you. Email us at

Material discussed is meant for informational purposes only, and it is not to be construed as investment, tax, or legal advice. Please note that individual situations can vary. Therefore, this information should be relied upon when coordinated with individual professional advice.

© 2020 Schneider Downs. All rights-reserved. All content on this site is property of Schneider Downs unless otherwise noted and should not be used without written permission.

our thoughts on

Technology BY Adam Costa
RPA for CPAs Series: Changes Underway
Do Relocation Companies Require a SOC (System and Organization Controls) Report?
Technology BY Adam Costa
RPA for CPAs Series: Advantages to Automation
What has COVID-19 taught us about our businesses processes?
Technology BY Adam Costa
RPA for CPAs Series: Bringing on Bots to Enhance a CPA’s Work
Facial Recognition - Future of Law Enforcement or More of the Same?

Register to receive our weekly newsletter with our most recent columns and insights.

Have a question? Ask us!

We’d love to hear from you. Drop us a note, and we’ll respond to you as quickly as possible.

Ask us

contact us

Map of Pittsburgh Office

One PPG Place, Suite 1700
Pittsburgh, PA 15222
p:412.261.3644     f:412.261.4876

Map of Columbus Office

65 East State Street, Suite 2000
Columbus, OH 43215
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102