Heard from a friend their company did a phishing simulation… using their actual @domain .com as the sender.
Dawg what are you even training your users to avoid, legitimate email?
Heard from a friend their company did a phishing simulation… using their actual @domain .com as the sender.
Dawg what are you even training your users to avoid, legitimate email?
@tknarr @SwiftOnSecurity it's a nasty test but I too see the logic in it.
Though you'd want to pepper a "real domain" test with some educational red flags if you were going that way.
Ask the user to buy the boss some random gift cards or change some payroll / vendor data at least.
@krupo @tknarr @SwiftOnSecurity IMO you should only do this if you think your org's risk of spoofing attacks is high and you've given your employees the tools to suss out its illegitimacy.
If you haven't given them easy ways to identify a spoofed message, you're not training them, you're just dunking on them. Enough will fail no matter what.
Ultimately Security should do their damnedest to prevent an employee from ever being in this position.
@kevinmirsky @krupo @tknarr @SwiftOnSecurity and you should be training people who send out legitimate mass internal emails on what *NOT* to do.
I swear some of our internal corporate emails look like someone got the wrong ideas from our phishing training.
@SwiftOnSecurity That balances with the number of times companies send out legitimate email that matches all their descriptions of phishing emails. Training their users to click on phish.
I saw a thread talking about how you can't teach a dog better behaviour by punishing it, and for whatever reason, it made me think about phishing entrapment training.
I'm fucking astonished at the replies that see this as a legitimate security education tactic.