Out of 655 recipients 28.7% clicked on something within the email and 25 entered login credentials."
I wish I could say that was high, but I’ve seen worse. And know of a major financial company everyone would recognize that was double those numbers.
However. The old flight instruction / teaching / training side of this is important. If you did this test without telling them not to do it, testing their knowledge level, telling them again, and telling them once more... it’s shock and awe to build a budget and not a legitimate learning process.
Additionally, humans respond better to positive than negative feedback. If you’re only publishing how naughty they were, and didn’t praise and reward those who did it right, you only did half of the job.
The IT security personality often is a nerd who loves sitting in their office, monitoring, writing docs, doing all the techy stuff, and they never once get out of the chair, and walk their ass down the hall with a big ass bag of assorted candy and treats to personally hand to the staff that did good. Or whatever. You get the idea.
...but the best part was they had a mail header 'X-Phish-Test: xxxxxx'
Oh FFS. Just fire the contractor sending those immediately. LOL. Gah.
Also.. I like how 90% of hacking is *not* some dude in a hoodie typing away at a matrix terminal but just clever social engineering.. or just raw guesswork
T’is true! I’ve often thought Red Teaming would be fun, but you literally have to think like a criminal. That can twist you a bit over time.
But there’s so many easy and effective social engineering hacks that’ll get you exactly what you want, it’s not funny. People intrinsically want to help and treat others well and trust strangers for the most part. It’s largely the biggest weakness of any organization. If I can convince someone I need help desperately it’ll turn off warning signs in many many brains and they’ll get the keys and open the server room door for me. LOL.
I've said it before and I'll say it again. Dilbert is not a comic strip. Dilbert is a documentary.
Scott Adams was an ISDN engineer at Pacific Bell. It truly is.