Understanding security practitioners’ experiences of investigating compromised email accounts

Neeranjan Chitare, Lynne Coventry, James Nicholson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Downloads (Pure)

Abstract

Cybersecurity breaches are a serious threat to economies and organisations across the globe in the digital landscape of today. Phishing attacks are one of the most common ways that these threats infiltrate businesses as they have developed into sophisticated strategies that make use of compromised accounts and exploit legitimate credentials for advanced attacks like lateral phishing. This paper investigates the processes employed by security practitioners in verifying the identity of account owners when suspecting a compromised account. Through semi-structured interviews with 13 cybersecurity professionals, we report on how practitioners are using diverse strategies for contacting suspected employees, including direct and indirect contact through line managers. We discuss the complexities in communication strategies during security incidents.
Original languageEnglish
Title of host publicationProceedings of BCS HCI 2024
EditorsDan Fitton, Matt Horton
PublisherBCS Learning & Development Ltd.
Pages136-145
Number of pages10
DOIs
Publication statusPublished - 13 Mar 2025
Event37th International BCS Human-Computer Interaction Conference - University of Central Lancashire, Preston, United Kingdom
Duration: 15 Jul 202417 Jul 2024
Conference number: 37th
https://bcshci.org/

Publication series

NameElectronic Workshops in Computing (eWiC)
PublisherBCS Learning & Development Ltd.
ISSN (Electronic)1477-9358

Conference

Conference37th International BCS Human-Computer Interaction Conference
Abbreviated titleBCS HCI 2024
Country/TerritoryUnited Kingdom
CityPreston
Period15/07/2417/07/24
Internet address

Keywords

  • Incident response
  • Cybersecurity practitioners
  • Account compromise

Fingerprint

Dive into the research topics of 'Understanding security practitioners’ experiences of investigating compromised email accounts'. Together they form a unique fingerprint.

Cite this