▲ | abtinf 6 days ago | ||||||||||||||||
Or just report their mandatory compliance emails as phishing attempts. I’ve worked for multiple large companies where the annual IT security signoffs look exactly like malicious emails: weird formatting; originates from weird external url that includes suspicious words; urgent call to action; and threats of discipline for non-compliance. All this money being spent on training, only to immediately lull users into accept threats. | |||||||||||||||||
▲ | grimgrin 6 days ago | parent | next [-] | ||||||||||||||||
you may or may not add a condition for emails with X-PHISH in its headers | |||||||||||||||||
| |||||||||||||||||
▲ | leptons 6 days ago | parent | prev | next [-] | ||||||||||||||||
The phishing-emails-as-a-test emails were so frequent that I started flagging all emails from our company that had a link in them as phishing emails and let the IT staff tell me which ones were real. They didn't enjoy that so they stopped sending the phishing emails as often. They still send them though, from time to time. I ended up creating my own browser extension for gmail that blocks clicking on any link unless the domain is whitelisted. Now if I click any link and it's not in the whitelist, it shows a popup that displays the domain name, and I can then choose to whitelist it and then it opens the link, or just keep blocking it. I haven't had to re-take any phishing compliance tests in a long time. | |||||||||||||||||
| |||||||||||||||||
▲ | 0x3444ac53 6 days ago | parent | prev [-] | ||||||||||||||||
The company I work at hired a vendor for their call center software, and said vendor spammed out all kinds of emails to everyone in the org on a daily basis. It was annoying and entirely useless. I just kept reporting them as phishing attempts and encouraged my coworkers to do the same. It worked. |