• flatbield@beehaw.org
    link
    fedilink
    arrow-up
    12
    ·
    edit-2
    1 day ago

    Ironic thing a company I use to work for would send out both email you need to click links to do your job then do training to not click links or even open the same kind of email. Then even test that by seeding in very realistic test email. Total stupidity. Your expected to tell the difference when there is no way to do so. The training was more CYA then anything, just blame the employee for shit company processes and security.

    • CompactFlax@discuss.tchncs.de
      link
      fedilink
      arrow-up
      5
      ·
      1 day ago

      I got some emails about required training from outside the company. I needed to download and complete a PDF, which had links to other forms to complete, all offsite. I do know with certainty that the email was legit, but I reported as phishing. Still haven’t heard back about this critical training attestation, so I assume their tracking is as awful as the process.

      It’s not my ass on the audit finding. Fix your shit.

    • Pulptastic@midwest.social
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      I report emails that I know are legit if it fails the phishing rules. Best example is unprompted emails from third party services that I know my company is using. If I don’t get a real email from a real employee either including the link or warning me that a valid third party link is coming, I’m not going to click it.

      Make your shit legit or I’m not gonna do it.

      • flatbield@beehaw.org
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        20 hours ago

        This is exactly it. Out sourced stuff that there is no way to verify. I stopped clicking on this stuff too unless I had to. Was still never sure.

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      2
      ·
      1 day ago

      It’s also such a dumb metric because most of people’s jobs are to click on links elsewhere on the internet, yet when it’s in an email, it’s bad? Unless you’re running an old browser or there is a 0 day, simply opening a link isn’t going to hack your system, but further actions by the user would need to be taken to be compromised. These simulations don’t account for that.

      • flatbield@beehaw.org
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        20 hours ago

        The real idiotic thing is a network where one client system compromise compromises the whole company. Bad network design.