neckspike

contemplating a crab's immortality


apocryphalmess
@apocryphalmess

Training humans to avoid phishing or social engineering with a 100% success rate is a likely impossible task. There is value in teaching people how to spot phishing and social engineering so they can alert security to perform incident response. By ensuring that even a single user reports attacks in progress, companies can activate full-scope responses which are a worthwhile defensive control that can quickly mitigate even advanced attacks. But, much like the Fire Safety professional world has moved to regular pre-announced evacuation training instead of surprise drills, the information security industry should move toward training that de-emphasizes surprises and tricks and instead prioritizes accurate training of what we want staff to do the moment they spot a phishing email - with a particular focus on recognizing and reporting the phishing threat.

In short - we need to stop doing phishing tests and start doing phishing fire drills.

google is losing its mind when it comes to its core business structure but there are still good folks in their infosec groups


You must log in to comment.

in reply to @apocryphalmess's post:

When there was an announcement at my workplace that they were going to revise rules for sick/PTO time, i got an email shortly after that was like (paraphrasing) "hi everyone, as you may have heard we are making changes to sick time, here is an internal link that will explain all the details" so i clicked on it without thinking too much. It loads up a webpage that basically says "this was a phishing test and you failed. Try harder next time", and i felt really dumb about it lol

Yeah for sure. The part that really made me feel dumb was when i looked at the email again afterwords, because the link was something like "[company].com/internal/documents/PTO" and when you hovered over it the URL resolved to an absurdly long address for some randomly generated domain