• Somewhiteguy@reddthat.com
    link
    fedilink
    arrow-up
    173
    arrow-down
    1
    ·
    9 hours ago

    Oh man. This is brilliant for phishing training. Get through some armor. Don’t let your biases get in the way. You can do a variation around this theme. One could be similar to above. Another is one that says you can opt-into this kind of thing by “Managing Preferences”. You’ll hit a large swath of people without them paying too much attention. I like this.

      • restingOface@quokk.auOP
        link
        fedilink
        English
        arrow-up
        52
        ·
        8 hours ago

        Reminds me of the COVID relief payment simulated phishing emails that made headlines. People complained that they had to take additional training after clicking some “Click here to retrieve your COVID relief funds” link during the early days of the pandemic that turned out to actually just be their corporate IT team sending a simulated phishing attack. They expected that this was the official government relief page that they have been waiting for, and were excited for the financial relief. Many people claimed that it was not okay do “prey” on people’s desperation at this point, but these simulated phishing emails were just getting people wary of the real thing. Actual scammers who were actually attempting to steal your money were absolutely sending these types of COVID relief phishing emails for real. So, these simulated emails were just preparing users in case one if the real spam emails happened to slip through the filters.

        • SparroHawc@piefed.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          15 minutes ago

          The thing that annoys me is that I still need to be careful when clicking on links in emails to my work address, despite having my web browser locked down to the nines. I just wanted to see what the page looked like, security peeps! I’m not a risk! I knew what it was!

          Still had to go through additional training, mutter grumble…

        • Somewhiteguy@reddthat.com
          link
          fedilink
          arrow-up
          19
          ·
          7 hours ago

          People get mad when they feel like they weren’t ready for training, but to your point, that’s why we train. To make you more aware when the real thing comes. Check all of your links. Verify it’s real before just clicking through.

          The issue has come from some companies threatening jobs when people don’t perform properly. I would love it if people saw this as just training and not a personal attack. You fell for the trick now how do you not get tricked next time? It might help if we did a quarterly report and put it on the intranet for people to see how many got clicked. Don’t make it a Wall-of-Shame, but a report to see how good things have been going. Put out sample emails that were the trickiest and what were the tells. Make Security a thing that is a growth aspect, not a shaming tactic.

          • drcobaltjedi@programming.dev
            link
            fedilink
            arrow-up
            5
            ·
            4 hours ago

            Yeah, at my last job we had fake phishing emails and if you clicked the link on them then the IT manager would see your name lit up on a dashboard. They were sent out randomly like a regular phishing email. The point is it’s a pop quiz.