We found out that 10% of our users entered their password.

24 points

I’m not in cyber security. My role requires me to interact with a lot of people, work on a bunch of different SharePoint links, and on top of that corporate sends a shit pile of email links to training, peakon surveys, and stuff like that. When I started my new job (3 years ago now), I had a pile of training to do as well as my usual work.

I would be fully focused, keyboard clacking loudly and ding! Email. grumble who the fuck is this now? Oh some stupid training link… wham. Phishing training. Fell for it 3 times.

permalink
report
reply
23 points

The whole Microsoft 365 system seems to be quite vulnerable to phishing. Sometimes SSO works, sometimes you need a password, maybe 2FA, maybe not. Many microsoft notification emails come from external sources (with a big banner “this email comes from an external sender, be cautious”).

This makes it hard for our brains to spot the small differences that make a phishing campaign successful.

permalink
report
parent
reply
22 points

The solution is to suspect every external message and send them all to the phishing mailbox. Tell your boss that you are following the phishing training that you did first.

They will have to get their shit together and send important messages from internal mail addresses. That’s just laziness.

permalink
report
parent
reply

Haha, love it

permalink
report
parent
reply
12 points

If employers don’t want employees to get phished, a good first step is to not overwork them…

permalink
report
parent
reply

Especially with the HR/Corp BS

permalink
report
parent
reply
6 points

At my work, the bogus phishing attacks are overly believable. They’ll even come from a known in-house email account.

I’ve been dinged twice while otherwise occupied. I’ve stopped checking my email altogether. Play stupid games, win stupid prizes. I am being paid to do a job.

permalink
report
parent
reply
4 points

Same. IT has inside info no real phishers will have. So far only got dinged once, but that’s enough. I was already terrible about answering emails, now I’ll be worse.

permalink
report
parent
reply
17 points

password123

Oh wait, that wasn’t the question?

permalink
report
reply
5 points

Put an ! at the end and it will be more secure.

permalink
report
parent
reply
4 points

Lol, we use the same password

permalink
report
parent
reply
17 points

I never got phished by the simulations because I never open my emails. If there’s something that needs my attention either someone will Slack me or a ticket on Jira made.

permalink
report
reply
12 points

I’m 100% so far at my job, but we had one test that tricked somewhere around 30% of employees. They spoofed everyone’s supervisor and made it look like an urgent Teams message was pending.

Usually, if you get phished you lose your bonus. They made an exception that one time.

permalink
report
reply
22 points

You lose your bonus? What basement-dwelling neanderthal executive came up with that hogwash?

permalink
report
parent
reply
4 points

To be fair, my job involves very sensitive medical data. We’ve seen entire businesses shut down because of data breaches.

permalink
report
parent
reply
12 points

Phishing simulations should be about educating employees, not punishing them. Train them on what they missed and if training material is available check where it might be lacking. Nobody learns from having their bonus taken away. It also only serves to stimulate a culture were people prefer not reporting possible security issues they might have caused, in order to avoid further pay cuts.

permalink
report
parent
reply
-3 points

I dunno…If you’re in a position to get a bonus, you should be smart enough to not click on random links and enter your work password.

I am extremely pro-worker but I would be fuckin pissed if an employee so easily gave a potential hacker access to our systems and that’s what the test is for

permalink
report
parent
reply
4 points

My understanding is that the phishing awareness mail is part of the training, and NOT a test. But company culture varies of course

permalink
report
parent
reply
4 points

I can only imagine how frustrating it would be to get a financial punishment for clicking on links.

permalink
report
parent
reply
5 points

Easy, never read or open mails. NEVER!

permalink
report
parent
reply
1 point

They tried a similar one on me once. Sent a email saying my boss (by name) sent me a virtual gift card. I immediately knew it was one of their “phishing tests” as my boss is a giant douche who would rather take the time to throw me under a bus than do anything that nice.

permalink
report
parent
reply
9 points

They haven’t fooled me yet. They’re actually fairly easy to spot.

permalink
report
reply
3 points

The last round my company did was pretty damn good. The email itself was well done and professional looking. They even registered a domain that was one letter different than the company name for the source email domain and the phishing form.

It was still one of those things that makes you hesitate like “your password has expired, click here to reset it” and the email client blatantly flagged it as being from outside our true domain. The client warning was the easy thing to spot, the rest was really well done.

permalink
report
parent
reply
4 points
*

That’s the odd thing with where I work, until recently all the phishing simulations were from within the company domain and so lacked the [External…]

It’s not impossible for an already infiltrated network, but I still expect to see that it came from outside. Maybe that’s me, tho.

Wdits: spullings <- like those

permalink
report
parent
reply
1 point

Wow, that is impressively sneaky to use the legitimate domain.

permalink
report
parent
reply

Cybersecurity - Memes

!cybersecuritymemes@lemmy.world

Create post

Only the hottest memes in Cybersecurity

Community stats

  • 2.2K

    Monthly active users

  • 79

    Posts

  • 1.2K

    Comments