It was a test and everyone who completed the training failed the training
@actualham I once had to take a web-based infosec training module in order to work with a certain client.
The module was implemented in Flash.
Run a virtual machine to delete soon?
Good time to find a better UNI, methinks!
The latest argument in favor of "those who can, do; those who can't, teach."
I'm an ex teacher, BTW/
And the final part:
Those who cannot teach administrate[1].
[1] or alternately: "teach teachers".
I presume the "we" hiring the consultants are not the faculty who usually know a thing but the administrators, who at many universities I'm familiar with are corporate/corp-adjacent types who know line-go-up.
Those that can't teach teach teachers
i was working for a large corporation during a time they were going through the due diligence for a merger. since both companies were publicly traded, there were some very strict SEC rules about access to the info from both companies.
in order for me to see said documents to do the techical review, it required that i used only windows explorer, disable all ad blockers, all security features, and authenticate over an insecure web link.
yay for security...
I hope you demanded an expendable computer and printer for the purpose and had them securely destroyed afterwards.
...and then washed your hands thoroughly.
3:O)>
Same as it ever was. Same as it ever was.
As part of #infosec, I weep when I see stuff like this and the training class.
The unauthenticated emails from 3rd party platforms that HR uses to inform employees of legit business stuff, the surveys, all of it.
And they wonder why BEC (business email compromise) keeps happening when the bad guys send a legit looking "We changed our bank account, please update this routing number" email to Accounts Payable.
i worked at a company that did 3rd party phishing mandatory training, with "click on this link" to start the video.
HR forgot to tell anyone that the email would be coming from a 3rd party or what domain name it should be for the link.
our VP of engineering was pretty proud that over 70% of the engineering part of the company reporting the email as a suspicious phishing attempt. sadly, we still had to watch the video, which was pretty useless...
@pseudonym @paul_ipv6 @actualham for a while I had a mortgage with a bank that primarily communicated via a generic bulk email provider that obfuscated links in emails.
So I'd get "Important notice about your loan" from nsw6252.salesmail-au.com and every URL was to ...cliktrak.org
They could not understand how this was problematic. "just click the link"
I used to have to do a sample submission procedure that required both enabling Excel macros and enabling JavaScript and I thought, I don't *really* believe that whoever set this up is a mole for a botnet farm, but I can't see how their behavior would be any different if they were.
Even worse, the SCORM standard was developed for the USA DoD :O
https://en.wikipedia.org/wiki/Sharable_Content_Object_Reference_Model
@ZS @actualham some of us have a VM with Windows and Edge and Chrome specifically for times like that. The VM gets reset after every event. No reason.
Also, please provide the link to the training in the form of a QR code in a PDF that takes users to a URL obfuscator before redirecting to the actual training.
In a virtual machine, of course.
@actualham malicious actors are the reason we can’t have nice things:
It seems that there’s no way to share anything with a URL these days.
You can’t even trust QR’s, and that is the only way to read a restaurant’s menu in Santiago since the pandemic.
@actualham I assume you probably got a link to that training by email. And it went to some site like mycompanytraining dot com, when your company’s domain is mycompany dot com. So you just clicked the link in the email to launch the web training that has you turning off the ad blockers and pop up blockers…
Perfect