Depending on the targeted entity, there will be different types of requirements, even if we could also highlight some generic ones.
If the target is an individual or a non-regulated entity, there are mostly "good practices" that are advised. The purpose is to increase detection through awareness. Email or social networks users are advised to focus on a few points
Is there anything unusual with the message if it comes from a known sender?
-
- Is the content consistent with the usual style and topics coming from this sender.
- Is the actual sender address the same as usually?
- Are there unusual files attached to the message (PDF, Office documents, Images...)?
- Does the message create an unusual sense of urgency?
- Does the message ask to click on a link that is not belonging to the organization supposed to have send it?
Different type of awareness campaigns at national or organizational level, can help to reduce the exposure to social engineering technics usually implemented by attackers in order to lure their victims through phishing attacks. Some security companies offer fake phishing campaigns to their customers, in order to help employees to have a better sense of what it means to be targeted, and to develop an experience in detecting the most common phishing tricks.
In order to better authenticate the sender of a message, organizations that have enough resources can implement all or some of the following standards:
Their main purpose is to improve the resistance of the original email protocol to forgery and impersonation.
Another set of measures is intended to reduce the risk of victimization by making the exploitation of the phished data more difficult.
It's mostly through the use of a second factor of authentication, which is deemed strong because being usable only for one transaction and available through a channel that is difficult if not impossible for the "phisher" to take control of.
The "token" provided by a bank to its customers is an example of such a second factor of authentication.
Another way to reduce victimization is to take down identified phishing websites. This is mostly done by organizations reporting to host providers which pages are fraudulent. Users can also contribute by reporting URL's of suspicious website to a service such as "URL Abuse" (https://www.circl.lu/urlabuse/). Reporting emails through SPAMBEE (spambee.lu) is another way for an end-user to ensure suspicious looking pages are checked and if confirmed fraudulent, are taken down.
Tools such as SPAMBEE, but also browsers themselves, are able to warn users when they access a web page already assessed as being a phishing. A visual warning is going to allow them to not proceed with this page.
For regulated entities, there will be obligations set by a Regulation Authority, to use or implement specific security mechanisms. They are usually chosen among those listed above. In Luxembourg, an example could be the “Circulaire CSSF 15/603”, which mandates payment providers to use strong customer authentication for internet payments. Another important point regarding regulated entities is that they often have to undergo regular operational risks' audits on behalf of the Regulation Authority, and this means they have to implement a robust risk management framework, which should encompass internet related operations. This usually leads them to implement proper security controls reducing the exposure of their customers to attacks such as phishing.