Lorem ipsum dolor sit amet consectetur adipiscing elit quisque faucibus ex sapien vitae pellentesque sem.

Give a man a FISH, feed him for a day.  Teach a man to recognize a PHISH, improve your security posture.

General understanding of how to recognize phishing techniques has improved in corporate settings over the last several years.  This is primarily due to the efforts of security awareness training and companies that take the time to run phishing campaigns in their environment.  Phishing prevention is vitally important due to the history of successful breaches using this technique.  According to the Techopedia website, 

Phishing Statistics Highlights

To safeguard against such threats, it’s crucial for organizations to conduct their own phishing simulation campaigns. These simulations not only help in identifying vulnerabilities but also in educating employees about recognizing and responding to phishing attempts. When conducting phishing campaigns, here are some helpful tips for a successful program:

Define Clear Objectives for the Campaign

This is the who, what, when, and how of the effort.  

Metrics

Track users who fall for phishing emails.  If the employee is often a repeat offender, offer additional training in prevention.  If possible, provide reports on failures by department, rates of clicks based on the template choices, and overall percentage of users who fell for the phish.  Showing a reduction in the number of clicks will demonstrate the effectiveness of the phishing program over time.

Involve Others 

Department leaders in areas outside of IT should be made aware of high-level results of their areas of responsibility.  Input on how to handle long-term offenders is valuable and this buy-in will be needed from the business.  This is also an opportunity to educate leaders on the risks of phishing and its impact on your company. 

Limit Who Knows about the Campaigns

As far as the actual campaign is concerned, keep details to a limited group.  Notify the Service Desk manager due to potential impact to call volume.  Security management should be informed due to the fact some of the emails may be reported.  However, the templates being utilized and timeframe should be kept to as few people as possible.

Education after the Campaign

After each campaign, provide education tailored to the results.  Post articles, create newsletters, or send reminders on how to identify a phish.  It is important to define a process on how suspected phishing emails are reported and handled.  Some phishing tools include plugins to report the email directly from the email client.  In these cases, when the email is reported, it is factored into the metrics of the campaign.  Security personnel can then report not only on how many clicked, but also who recognized the email and reported it for further investigation.

Phishing testing is a valuable procedure to improve overall security standing.  Access IT Group can assist with tool selection, general advice, or even managing campaigns.  If you would like to learn more, please contact us for additional information.

By: Matt Hileman – Lead Consultant – CISSP | CISA | QSA