All of these are easily found out. Names and job titles are often found on the company website or through social media (especially LinkedIn). For the other two points, simply emailing the organisation’s customer support does the trick. From the response, a cybercriminal can examine the email layout and design, and deduct how staff email addresses are structured (e.g., firstname.lastname@company.com). And yes, in extremely targeted cases, even these company email addresses can be spoofed, meaning that the criminal’s email address appears as an actual company email address, without any clever typos, even though they used another email address to send the scam message.
Cybercriminals might even go further and learn about specific events happening in the organisation.
One example: cybercriminals learn that one team member has their 25th anniversary at the company coming up. The criminals could then use the tricks we described above to send an email to that person, impersonating the company CEO, offering a gift card that can be found through a link in the email. The team member might not think twice about logging in with their company credentials, personally knowing and trusting the CEO for many years. The cybercriminals now have access to internal company systems.
Now keep in mind this is an extremely targeted example. Realistically, often a wider range of people, or simply the whole organisation is targeted. Still, this example illustrates the very real dangers of spear phishing.
Conclusively, a lot of responsibility lies with every single person in the organisation. You should prepare ALL you employees for phishing attacks as in the end, your organisation’s cyber security is only as strong as the weakest link. Which in this case would be an unaware employee who accidentally, through no fault of their own (spear phishing can be very convincing after all), is tricked by cybercriminals.
Everyone in the organisation needs to be aware of spear phishing attempts
Therefore, it should be a number one priority in any cyber security initiative to spread this knowledge to all people in the organisation. Staff should not only be aware of the usual tell-tale signs of phishing; ideally, they should examine every single email containing a request as if it were a phishing email. Checking the email address and the nature of the request should become routine for every person on the team.