Simulation of phishing attacks and Awareness Plans applicable to the business environment – A practical approach to improve organizational resilience

Main Article Content

Esthela Maribel Cabezas-Molina
Hugo Christiam Fiallos-Aguilar

Abstract

The study evaluated the effectiveness of phishing attack simulations and awareness plans to reduce employees' vulnerability to cyberattacks in a small business. Using a sample of one hundred employees, improvements in detecting fraudulent emails and response times were analyzed following a series of simulations and training programs. Initially, employees had a 65% click rate on malicious links, which decreased to 20% after the intervention, validated by regression analysis and T-tests with a p-value less than 0.001. Response time improved from an average of 50 minutes to 20 minutes. The analysis revealed that age, work experience, and access to sensitive information impacted response capacity, with better results among younger, technologically experienced employees. Although awareness reduced vulnerability, risks associated with human behavior persisted, suggesting the need for ongoing training and automated technological solutions. Despite sample limitations, the results indicated that phishing simulations and personalized training programs are valuable tools for enhancing cybersecurity. It is recommended that companies implement awareness plans as part of comprehensive cybersecurity strategies, tailored to employees' demographic characteristics and responsibility levels. Future research should address larger companies and several types of cyberattacks. The study concludes that these strategies effectively improve threat response and detection, building a more resilient organizational culture towards cybersecurity.

Downloads

Download data is not yet available.

Article Details

How to Cite
Cabezas-Molina, E. M., & Fiallos-Aguilar, H. C. (2024). Simulation of phishing attacks and Awareness Plans applicable to the business environment – A practical approach to improve organizational resilience. INNOVA Reseach Journal, 9(4), 95–110. https://doi.org/10.33890/innova.v9.n4.2024.2678
Section
Business and Innovation
Author Biographies

Esthela Maribel Cabezas-Molina, Universidad Internacional del Ecuador, Quito, Ecuador

Esthela Maribel Cabezas Molina, Ecuadorian, Master in Planning and Strategic Management, Army Polytechnic School, Business School Professor at the International University of Ecuador, lines of research: Business and Innovation. Google Schoolar link: https://scholar.google.com/citations?view_op=list_works&hl=es&hl=es&user=2E-zyssAAAAJ

Hugo Christiam Fiallos-Aguilar, Universidad Internacional del Ecuador, Quito, Ecuador

Hugo Christiam Fiallos Aguilar, Ecuadorian, Master in Information Systems Management and Business Intelligence, University of the Armed Forces ESPE, Business School Professor at the International University of Ecuador, lines of research: Business and Innovation.

References

Ávila-Coello, A. A. (2024). Seguridad de la información en instituciones públicas: desafíos y buenas prácticas en el contexto ecuatoriano. Journal of Economic and Social Science Research 4(2), 140–156. https://doi.org/10.55813/gaea/jessr/v4/n2/96

Banco Mundial. (2020). Global Economic Prospects. Washington, DC: Banco Mundial. https://openknowledge.worldbank.org/handle/10986/33748

Bass, B., & Avolio, B. (2000). MLQ Multifactor Leadership. Mind Garden.

Bautista Chimarro, F. F., Flores Ruiz, A. E., & Aguirre Inga, R. G. (2023). Ciberseguridad en pymes: caso de estudio en Cayambe. Dominio de las ciencias, 388–402. https://doi.org/10.23857/dc.v9i4.3597

Bazalar H., G., Esteban R., C. D., & Rodriguez N., J. P. (2022). Modelo de madurez para determinar el nivel de cultura de ciberseguridad en organizaciones industriales. Lima: Universidad Peruana de Ciencias Aplicadas (UPC). http://hdl.handle.net/10757/669347

BCE. (2020). Estadísticas económicas: Sector real. Obtenido de Banco Central del Ecuador: https://contenido.bce.fin.ec/documentos/Estadisticas/SectorReal/CuentasCantonales/Indice.htm

Benavides-Astudillo, E., Fuertes-Diaz, W., & Sánchez-Gordón, S. (2019). Un experimento para crear conciencia en las personas acerca de los ataques de Ingeniería Social. Revista Ciencia UNEMI, 27-40. https://www.redalyc.org/journal/5826/582661898003/582661898003.pdf

Bueno, G., & Haz, L. (2022). Ciberseguridad post Covid-19 y su impacto en las pymes del Ecuador [Post-covid-19 cybersecurity and its impact on Ecuador's SMEs]. Pro Sciences: Revista De Producción, Ciencias E Investigación, 6(46), 103–120. https://doi.org/10.29018/issn.2588-1000vol6iss46.2022pp103-120

Casana, K., & Carhuancho, I. (2019). Análisis de la gestión del talento humano en una institución pública, en Perú. Investigação Qualitativa em Ciências Sociais/Investigación Cualitativa en Ciencias Sociales, 3, 120-125.

Cegarra, J., & Martínez, A. (2017). Gestión del conocimiento. Una ventaja competitiva. Madrid: ESIC.

CEPAL. (6 de agosto de 2020). Comisión Económica para América Latina y el Caribe. (CEPAL, Ed.) Obtenido de Comisión Económica para América Latina y el Caribe: https://repositorio.cepal.org/bitstream/handle/11362/45877/S2000497_es.pdf?sequence=1&isAllowed=y

Du, D., Zhu, M., Li, X., Fei, M., Bu, S., Wu, L., & Li, K. (2023). A Review of Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyberphysical Power Systems. Journal of Modern Power Systems and Clean Energy, 11(3), 727-743. https://doi.org/10.35833/MPCE.2021.000604

ESET. (2023). Security Report Latinoamérica 2023. https://web-assets.esetstatic.com/wls/es/articulos/reportes/eset-security-report-latam2023.pdf

Flores-Álava, S., & Mena-Hernández, L. (2023). Propuesta de Buenas Prácticas para Mitigar Ciberataques en Usuarios de Entidades Financieras [Proposal for Good Practices to Mitigate Cyber-attacks on Users of Financial Institutions]. 593 Digital Publisher CEIT, 8(4), 159-173. https://doi.org/10.33386/593dp.2023.4.1652

Gioulekas, F., Stamatiadis, E., Tzikas, A., Gounaris, K., Georgiadou, A., Michalitsi- Psarrou, A., Doukas, G., Kontoulis, M., Nikoloudakis, Y., Marin, S., Cabecinha, R., & Ntanos, C. (2022). A Cybersecurity Culture Survey Targeting Healthcare Critical Infrastructures. Healthcare, 10(2). https://doi.org/10.3390/healthcare10020327

INEC. (2020). Insituto Nacional de Estadísticas y Censos. Obtenido de Presentación General CENEC 2011: https://www.ecuadorencifras.gob.ec/informacion-censal-por-provincias/

Jara Fuentealba, N., & Jorquera Cruz, A. (2021). La responsabilidad de la Administración del Estado por incidentes de ciberseguridad. Revista Chilena de Derecho y Tecnología, 10(1), 201–230. https://doi.org/10.5354/0719-2584.2021.58776

Leal, M. M., & Musgrave, P. (2023). Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity. Contemporary Security Policy, 44(3), 437-461. https://doi.org/10.1080/13523260.2023.2216112

López-Anchala, K. A., & Ordóñez-Parra, Y. L. (2024). Auditoría y ciberseguridad en el sector comercial: evaluación de resiliencia ante amenazas digitales [Audit and cyber security in the commercial sector: assessing resilience to digital threats]. Revista Multidisciplinaria Perspectivas Investigativas, 4(especial), 14–27. https://doi.org/10.62574/rmpi.v4iespecial.154

López Martínez, A., Gil Pérez, M., & Ruiz-Martínez, A. (2023). A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare. ACM

Martínez-Osorio, F. (2021). Plan de concienciación sobre la importancia de la seguridad de la información en las entidades de salud del sector público de Bogotá. Bogotá: Universidad Católica de Colombia. https://hdl.handle.net/10983/25739

Naciones Unidas. (2021). La ciberseguridad en las organizaciones del sistema de las Naciones Unidas. Ginebra: Naciones Unidas. https://www.unjiu.org/sites/www.unjiu.org/files/jiu_rep_2021_3_spanish.pdf

Ortiz Plaza, R., & Nuñez Barjola, A. (2021). De la concienciación al riesgo humano en ciberseguridad. Revista SIC: ciberseguridad, seguridad de la información y privacidad, 72-73. https://dialnet.unirioja.es/servlet/articulo?codigo=7846549

Piñón, L. C., Sapién, A. L., & Gutiérrez, M. d. (2023). Capacitación en ciberseguridad en una empresa mexicana. Información tecnológica 34(6), 43-52.

Prümmer, J., Stee, T. v., & Bibi van den Berg. (2024). A systematic review of current cybersecurity training methods. ScienceDirect. https://doi.org/10.1016/j.cose.2023.103585

Renaud, K., & Ophoff, J. (2021). A cyber situational awareness model to predict the implementation of cyber security controls and precautions by SMEs. Organizational Cybersecurity Journal: Practice, Process and People, 1(1), 24-46. https://doi.org/10.1108/OCJ-03-2021-0004

Salameh, R. (2019). The relationship between engagement levels and players’ intended behaviors in game-based training for cybersecurity. Southern Illinois University at Carbondale.

https://www.proquest.com/openview/0437a8291df470b1e1163eac37204cc7/1?pq-origsite=gscholar&cbl=18750&diss=y

Shaw, C. (2020). Why phishing works and the detection needed to prevent it (master’s thesis, Utica College). https://www.proquest.com/openview/83fb2f7120db42f9209cc52837774982/1?pq-origsite=gscholar&cbl=51922&diss=y

Uchendu, B., Nurse, J. R. C., Bada, M., & Furnell, S. (2021). Developing a cyber-security culture: Current practices and future needs. Computers & Security, 109, 102387. https://doi.org/10.1016/j.cose.2021.102387

Zhang, X., Zeng, Y., Jin, X. B., Yan, Z. W., & Geng, G. G. (2018). Boosting the phishing detection performance by semantic analysis. In Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. 1063–1070. https://doi.org/10.1109/ BigData.2017.8258030