What is the purpose of running a phishing campaign within a company?
To determine how many employees would click a phishing link in a corporate email.
How can a company execute a phishing campaign?
By sending emails to the user community and tracking who clicks on the emails.
What type of report does an automated phishing system provide?
Reports on opens, clicks, and any interaction with the phishing email.
What happens if a user clicks on a phishing link?
They receive an automated email informing them of their mistake and may need to undergo additional training.
What should users look for to recognize phishing emails?
Spelling or grammatical errors, inconsistencies in the domain name, unusual attachments, and requests for personal information.
What is the ideal function of an email filter regarding phishing attempts?
To block phishing attempts before they reach a user’s inbox.
What should users know about clicking links and running attachments in emails?
They should never click links or run attachments from inside an email.
What is the process for reporting suspected phishing emails?
There should be a well-known process for reporting to the IT security team.
What is ‘Anomalous behavior recognition’?
Identifying unusual behavior on a user’s workstation that may indicate security risks.
What types of risky behaviors might be monitored?
What is required for a security team to be aware of anomalous behaviors?
Constant monitoring and reporting of security events.
What should be included in automated reporting for security metrics?
What is the goal after a user clicks a phishing link?
To provide user training to make them aware of the issue.
What is the role of the security awareness team?
To monitor, report, and train users on security issues.
What types of materials can the security team create to inform users about security issues?
How can the security awareness team track the effectiveness of their training efforts?
By using automated reporting systems to create detailed metrics.
What should the training materials created by the security awareness team address?
IT security and compliance requirements.
Where might you find evidence of a company’s security awareness efforts?
In office buildings through classroom training, posters, and information about security concerns.
What is the importance of correlating training efforts to overall security?
To assess the effectiveness of security measures and identify areas needing emphasis.