this post was submitted on 05 Jan 2024
734 points (98.7% liked)

memes

10698 readers
2967 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/AdsNo advertisements or spam. This is an instance rule and the only way to live.

Sister communities

founded 2 years ago
MODERATORS
 

Alt text: Michael Scott Handshake meme. Managers text: "My company Congratulating me on avoiding a phishing test email". Michael Scott text: "Me, terminally behind on answering email."

all 49 comments
sorted by: hot top controversial new old
[–] Kalkaline@leminal.space 39 points 11 months ago (3 children)

"Let's also make our users follow really complex password requirements but have our password creation/change page be different from the actual login screen so they have a really hard time using a password manager"-dumbass IT department

[–] Zoidsberg@lemmy.ca 18 points 11 months ago (1 children)

Change your password every 30 days, and never reuse one, and don't use a password manager, and don't write it down anywhere, and...

[–] SPRUNT@lemmy.world 20 points 11 months ago

The "Forgot password?" link is my new login process.

[–] BeardedSingleMalt@kbin.social 14 points 11 months ago

15 character minimum passwords that expire every 90 days and require MFA to remote in from home with 3 separate login sessions just to get to your PC, along with stripped down rights for everyone, even IS. The rights are so strict that if you wanted to, for instance, update a trusted application like Notepad++ because a recent exploit was found which would be a security concern, you can't use the auto-update feature of the application; you have to download it manually from their repository, and run it using a special admin account created for you that doesn't have an associated email address but also has a 90 day password requirement. But you wouldn't been able to use their repository 6 months ago because we block any IP address outside the US and their previous service was located in UK, so if you wanted to keep that piece of software up-to-date with security and vulnerability patches (which they've harped on a number of times before) you'd have to find alternative download services located in the US regardless of how shady.

I wish I was joking.

[–] Edgarallenpwn@midwest.social 6 points 11 months ago

My current employer actually just changed our password policy to greatly extend the password expiration date. We have cranked up the password requirements a tad, every login has 2FA and permissions are locked down to the size of a gnats asshole. Users seem to like it better since they don't have to come up with a new password as often and we are telling ourselves it's harder to brute force.

[–] SPRUNT@lemmy.world 27 points 11 months ago (2 children)

My company sent me a fishing test email from a "no-reply@companyname.com" email address. I sent it to our security department and asked if I would ever get legitimate emails from that address. They never responded except to say that I passed the phishing test, so I set up a filter to automatically forward emails from that to our security department with a message questioning its validity. Let's security tell me if emails are legit or not.

[–] Concave1142@lemmy.world 11 points 11 months ago

My normal method is I will hit the phishing attempt icon that IT Security added to our Outlook on anything that I did not request or sign up for.

I'm sure the IT Security person who saw all the "free gift card" emails had a great Christmas if they claimed all the gift cards emails they deem legit.

[–] Thorry84@feddit.nl 24 points 11 months ago (2 children)

Where I work you only pass the test if you report it to IT, otherwise it's 3 hours of training with the rest of the idiots.

[–] bamboo@lemmy.blahaj.zone 13 points 11 months ago (4 children)

Does IT want useless reports? Because that's how you get useless reports?

[–] Alteon@lemmy.world 10 points 11 months ago (1 children)
[–] CurlyMoustache@lemmy.world 4 points 11 months ago* (last edited 11 months ago)

There are no "useless reports" when compared to the alternative

[–] Thorry84@feddit.nl 5 points 11 months ago* (last edited 11 months ago) (1 children)

The IT people send out the phishing mail themselves as part of a test. It isn't an actual phishing mail, just something made to look and act like one. In the end they have a report which people fell for it, which ignored it (or were ooo) and which reported it.

Reporting is done via the report phishing feature in Outlook. For consumers it's sent to Microsoft, but for businesses you can configure those reports to do what you want. It's actually a really good feature and people should always use it.

[–] bamboo@lemmy.blahaj.zone 3 points 11 months ago (1 children)

Does your IT team tell you that they're performing the test and to report, or is reporting phishing always constantly recommended. I've managed a small org ( <100 ) email server and we tried to have people report suspicious emails and it was so much noise and wasted so much time. Of course the CEO isn't requesting you buy gift cards, what am I going to do about it. I'd say the money would be better spent on a better system rather than hope one human forwards it to another human.

[–] Thorry84@feddit.nl 3 points 11 months ago* (last edited 11 months ago) (2 children)

They don't tell us they are testing, it's done at random. Reporting is policy, it needs to be done with every phishing mail that gets past the filters. It's one of the big ways a company is vulnerable, an employee clicks on a link in a mail, opens something they shouldn't and before you know it there's been a databreach. I don't think they are especially worried about the employee leaking his personal info, they are worried about targeted attacks and corporate espionage.

I'm sure there are a lot of false positives. Even though I work in a technical company, we have plenty of people who aren't as handy with tech. People get training regularly and if one person reports a lot of useless I'm sure they will train that person extra. I think for a lot of people except maybe sales something like 80% of all mail is internal. And the other part is probably 50% repeating automated mails. So the number of mails that could even be phishing are limited. It's a mid sized company with about 1000 employees.

[–] bamboo@lemmy.blahaj.zone 1 points 11 months ago (1 children)

I see the benefit of reporting to catch false negatives of the filters, but in reality, if I received more than one report in a week or two, id consider a new system for scanning. A 20% false negative rate is pretty bad. Most emails should be easily identified, and I think it's unreasonable for end users to check if the sender domain name is newly registered, has utf-8 characters which look like ASCII characters, etc. The metric for success shouldn't be a high number of end users reporting phishing emails, but that seems to be what upper management wants to see, which just incentives less resources invested in better scanners with less than a 20% false negative rate.

[–] Promethiel@lemmy.world 2 points 11 months ago

The metric for success shouldn't be a high number of end users reporting phishing emails, but that seems to be what upper management wants to see, which just incentives less resources invested in better scanners with less than a 20% false negative rate.

The eternal battle between the "oh we go by data backed metrics, much measured, I feel this is the best" executive suite and the poor saps beneath twirling the data backed signs going ignored until money or disaster strikes.

Pity businesses aren't formed from the bottom up; it's like an octopus deciding not to listen to its arm brains until the shark has a bite of its head.

[–] UserMeNever@feddit.nl 0 points 11 months ago (1 children)

Sounds like your email software needs fixing....

[–] Thorry84@feddit.nl 1 points 11 months ago

Sure let me go tell Microsoft

[–] Black616Angel@feddit.de 1 points 11 months ago (1 children)

No, it's better to get some useless reports than to get no reports at all because "somebody will surely report this".

Also people stay alert when punishment is an option.

[–] bamboo@lemmy.blahaj.zone 1 points 11 months ago

It's actually a big problem: https://en.wikipedia.org/wiki/Alarm_fatigue more alerts is not always better.

[–] BeardedSingleMalt@kbin.social -3 points 11 months ago (4 children)

This is how they justify their jobs.

[–] CalamityPayne@jlai.lu 9 points 11 months ago

No. Technically illiterate users, that's how we justify our jobs.

[–] theneverfox@pawb.social 1 points 11 months ago

Justify their jobs? Their job is to set shit up, then be around at all times to help already frustrated people to do something they just forgot how to do today for no reason. And then, to politely listen as the person makes excuses to preserve their ego

Security compliance? That's handed down to them. If they had a hard on for cyber security, they could make 2-3x as much and no longer have to explain to people that they joined the wrong teams call

I make a point to get to know the service staff. Chat with the custodian. Go to IT when you don't have a problem... Get to know them a little as a person. Then, when you have a problem, you don't have to make a ticket and wait for them to get to you. You already know them, and they feel respected as a person - they might not drop everything, but they're going to bend the rules and quietly tell you how to navigate the system to get what you need as painlessly as possible

They'll also know if you're an idiot or not already - they might know to trust you at your word, or they might know tech makes your eyes go glassy and hold your hand patiently... But either way, the respect makes them want to help you, and the preexisting relationship makes the whole experience less painful

It is a shit job... It's the overlap between being in the service industry and a tech worker. Almost all of them couldn't make it in a more specialized role that would pay far, far more, and if you walk in during downtime half of them will be practicing their programming hoping to get a better job

[–] LemmyIsFantastic@lemmy.world -1 points 11 months ago

I think you mean satisfy regulatory requirements.

[–] ThePowerOfGeek@lemmy.world 5 points 11 months ago

Damn, that's kinda harsh.

[–] Boozilla 21 points 11 months ago (1 children)

I created an inbox rule for these. The 3rd party phishing shame-and-train company my employer uses always has a certain domain in the email header (even though they always change the 'from' address). Has worked perfectly for over 6 months. I'm generally not dumb enough to click on them anyway. But anyone can have a bad day and/or get into a rush and make a mistake. And my boss is a sadistic prick who delights in making workers feel dumb. Yet I'm 100% sure he exempts himself from the phishing shit tests.

[–] BeardedSingleMalt@kbin.social 10 points 11 months ago (2 children)

Knowbe4? That's who we use and their stuff is pedestrian

[–] TORFdot0@lemmy.world 3 points 11 months ago

The point isn’t to be so tricky to make it too hard for end users to catch it. It’s to train them to start looking at things such as senders domain and to report messages and avoid the link, etc.

[–] fedev@lemmy.world 2 points 11 months ago

Using this too. But you have to report them, can't just filter and forget.

[–] 15liam20@lemmy.world 17 points 11 months ago (1 children)

My company appends a 'think before you click' header to external emails which are noticeably absent from the phishing tests.

[–] Chobbes@lemmy.world 5 points 11 months ago

Mine always have the ReplyTo field set to the email of the senior security analyst, so I always say hi and tell them that maybe the higher ups need some training on how to not send sketchy as fuck emails that train people to click on phishing links.

[–] Zoboomafoo@slrpnk.net 14 points 11 months ago (1 children)

I eventually clicked the link in the test email out of curiosity, I got a nice popup telling me I fucked up

[–] Edgarallenpwn@midwest.social 18 points 11 months ago (1 children)

Have fun watching training videos for an hour and a half. It's just free money

[–] Zoboomafoo@slrpnk.net 9 points 11 months ago (1 children)

Nah, I got fired like a week later for no reason

[–] Edgarallenpwn@midwest.social 8 points 11 months ago* (last edited 11 months ago)

Damn that's extreme. Sorry to hear that.

[–] lurch@sh.itjust.works 10 points 11 months ago (1 children)

Mine gives useless bonus points for forwarding the test email or an actual phishing mail to their special security scanner account.

[–] bamboo@lemmy.blahaj.zone 2 points 11 months ago (2 children)

Why not just have the security scanner before it hits an inbox?

[–] YoorWeb@lemmy.world 3 points 11 months ago* (last edited 11 months ago)

Filters will catch 90% of spam/phishing but there's always something new that will slip through to inbox.

[–] lurch@sh.itjust.works 1 points 11 months ago (1 children)

There is, but if one gets through, they want us to forward it to this account that will be used to train, fine tune and improve the scanner for all mailboxes, as well as security training for employees.

[–] bamboo@lemmy.blahaj.zone 2 points 11 months ago

That makes sense, I thought the security scanner was only triggered if someone forwarded an email after it landed in an inbox.

[–] SocialMediaRefugee@lemmy.world 9 points 11 months ago

I just forward all of management's emails to the phishing account.

[–] Ainiriand@lemmy.world 7 points 11 months ago (1 children)

I am a software developer, I do not read emails. If something is so important that I should know about it someone will hit me up on ms teams or such.

[–] Alexstarfire@lemmy.world 5 points 11 months ago (1 children)

Ohh, so you're the asshole.

[–] Ainiriand@lemmy.world 1 points 11 months ago

No, I'm the productive one.

[–] MrShankles@reddthat.com 7 points 11 months ago

I always right-clicked for the "more info" (or whatever it was) with any suspicious email. It would look like a bunch of html code that I didn't really understand, but buried in there would be a company name that was usually obvious, like "phishtesting.com" or some bullshit.

I always had a 100% report rate, and always joked that I was waiting to get a prize for my accuracy. And obviously, also a joke to ever think I would get anything for it

[–] danielf@aussie.zone 1 points 11 months ago

The best way to avoid scam emails is just to change your email account's password to a random string, not save it, then log out. I've also shredded my SIM card so I can't receive scam texts.