User Tools

Site Tools


general_planing

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
general_planing [2016/05/20 20:10] – [Checklist: what you may ask your client prior to a phishing campaign] lucygeneral_planing [2021/04/06 15:24] (current) lucy
Line 4: Line 4:
 ===== Does it make sense to really test employees? ===== ===== Does it make sense to really test employees? =====
  
-Yes. The benefits of simulated attack training are: +Yes. The benefits of simulated attack training are: 
  
-  * It increases specific awareness of the phishing and Malware threats. When employees fall for a simulated attack, they become more aware of the real threat and more receptive to the messages from IT security.+  * It increases specific awareness of phishing and Malware threats. When employees fall for a simulated attack, they become more aware of the real threat and more receptive to the messages from IT security.
   * It improves the general awareness of security. Simulated attack programs help to open the lines of communication between employees and security staff which in turn helps to improve the efficiency of general security awareness training.   * It improves the general awareness of security. Simulated attack programs help to open the lines of communication between employees and security staff which in turn helps to improve the efficiency of general security awareness training.
   * It provides security training metrics. Simulated attacks allow you to track the effectiveness of your security training over time and to target the areas or people that most need additional training.   * It provides security training metrics. Simulated attacks allow you to track the effectiveness of your security training over time and to target the areas or people that most need additional training.
Line 21: Line 21:
   * Alert all your end users/employees before you start the assessment program so no one feels that they have been “tricked.”   * Alert all your end users/employees before you start the assessment program so no one feels that they have been “tricked.”
   * Start out with easy to detect emails and then gradually make them more difficult.   * Start out with easy to detect emails and then gradually make them more difficult.
-  * Targeted spear-phishing emails should not be deployed until the end of the first year of your programunless these are a pressing concern.     +  * Targeted spear-phishing emails should not be deployed until the end of the first year of your program unless these are a pressing concern.     
   * Use variations of a category of phishing scenarios to gauge learning.     * Use variations of a category of phishing scenarios to gauge learning.  
   * Conduct assessments no more than monthly or quarterly.    * Conduct assessments no more than monthly or quarterly. 
-  * Keep the names of those who fall victim (fail) confidential.  If there are circumstances under which you would report the information to management, such as five-time or greater repeat-offenders, explain that to end users upfront.    +  * Keep the names of those who fall victim (fail) confidential.  If there are circumstances under which you would report the information to management, such as five-time or greater repeat-offenders, explain that to end-users upfront.    
-  * Send out the results of the assessment as soon as possible after you deploy it, preferably within 48 hours of sending out the phishing email.  Explain what was suspicious about the email and remind end users that it is a training exercise and that the names of those who fell for the simulation are not reported to management.+  * Send out the results of the assessment as soon as possible after you deploy it, preferably within 48 hours of sending out the phishing email.  Explain what was suspicious about the email and remind end-users that it is a training exercise and that the names of those who fell for the simulation are not reported to management.
  
  
 ===== What other preparations need to be done? ===== ===== What other preparations need to be done? =====
  
-  * 1.Please alert your IT or Helpdesk Department.   +  Please alert your IT or Helpdesk Department.   
-  * 2.For the duration of the test, whitelisting the email address or addresses from the simulated phishing email templates you have chosen for simulated phishing emails. +  For the duration of the test, whitelisting the email address or addresses from the simulated phishing email templates you have chosen for simulated phishing emails. 
-  * 3.Whitelist the domain name of the chosen landing page. +  Whitelist the domain name of the chosen landing page. 
-  * 4.Adjusting any other settings, as necessary, to ensure the simulated phishing emails make it to end user inboxes. +  Adjusting any other settings, as necessary, to ensure the simulated phishing emails make it to end-user inboxes. 
-  * 5.Always do a test run with a few sample emails before sending them out to recipients. +  Always do a test run with a few sample emails before sending them out to recipients. 
-  * 6.Use LUCY's SPAM/Performance Test to make sure that the server can handle all requests and that emails don't get filtered. +  Use LUCY's SPAM/Performance Test to make sure that the server can handle all requests and that emails don't get filtered.
  
 ===== E-MAIL COMMUNICATION AHEAD OF THE CAMPAIGN ===== ===== E-MAIL COMMUNICATION AHEAD OF THE CAMPAIGN =====
Line 49: Line 48:
 Team, Team,
  
-As you know, we take information security extremely seriously.  As part of our on going security awareness program, at different times, we will be testing your understanding of this training, including quizzes, awareness surveys and assessments.  Starting next month, we will be kicking off phishing assessments. A phishing assessment is nothing more than when we send out an email pretending to be a hacker. These are the very same email attacks that the bad guys are sending.  The only difference is that these emails will not harm you in any way. They are only designed to track how many people fall victim to them and to help you learn how to identify these scams and protect yourself. +As you know, we take information security extremely seriously.  As part of our ongoing security awareness program, at different times, we will be testing your understanding of this training, including quizzes, awareness surveys and assessments.  Starting next month, we will be kicking off phishing assessments. A phishing assessment is nothing more than when we send out an email pretending to be a hacker. These are the very same email attacks that the bad guys are sending.  The only difference is that these emails will not harm you in any way. They are only designed to track how many people fall victim to them and to help you learn how to identify these scams and protect yourself. 
  
 A couple of key points. A couple of key points.
Line 55: Line 54:
 • We will be sending out these emails once a month randomly.  Each month will be different. • We will be sending out these emails once a month randomly.  Each month will be different.
 • If you fall victim to one of these phishing emails you will be notified immediately.   • If you fall victim to one of these phishing emails you will be notified immediately.  
-• If you fall victim your name will not be reported to management. It will not impact you in anyway. This training is designed to help you learn.+• If you fall victim your name will not be reported to management. It will not impact you in any way. This training is designed to help you learn.
 • Twenty-four hours after each assessment, we will send an email out to everyone explaining the attack and how you could have figured out the email was a scam or attack. • Twenty-four hours after each assessment, we will send an email out to everyone explaining the attack and how you could have figured out the email was a scam or attack.
  
Line 78: Line 77:
  
  
-**NOTE:** Be sure to include screenshot of the attack in the email so that people can read and learn from it.+**NOTE:** Be sure to include screenshot of the attack in the email so that people can read and learn from it.
  
 ===== Checklist: what you may ask your client prior to a phishing campaign ===== ===== Checklist: what you may ask your client prior to a phishing campaign =====
Line 96: Line 95:
 | eLearning| Should the campaign include also [[awareness_e-learning_settings|eLearning content]]? If yes: does it need to be customized? It is required that individual eLearning statistics are also logged? |  | eLearning| Should the campaign include also [[awareness_e-learning_settings|eLearning content]]? If yes: does it need to be customized? It is required that individual eLearning statistics are also logged? | 
 | Running the campaign   | Should all mails be send simultaneously or is it better to send the mails over a longer time period using the [[scheduler|scheduler]]? | Running the campaign   | Should all mails be send simultaneously or is it better to send the mails over a longer time period using the [[scheduler|scheduler]]?
-| Organizational    | When can the test start, until when does it has to be finished?+| Organizational    | When can the test start, until when does it have to be finished?
 | View Only Access    | Does the client wish to get a [[user_management|view only access]] on LUCY to monitor the campaign statistics? | View Only Access    | Does the client wish to get a [[user_management|view only access]] on LUCY to monitor the campaign statistics?
-| Log & Success Level| What is considered a [[success_actions|successful attack]] (link click, data submit etc.)? Should LUCY also trigger [[monitor_a_campaign_statistics|opened mails]]? Can advanced client side scripts ([[beef_integration|BeEF]]) be executed to gather more detailed information about the user?+| Log & Success Level| What is considered a [[success_actions|successful attack]] (link click, data submit etc.)? Should LUCY also trigger [[monitor_a_campaign_statistics|opened mails]]? Can advanced client-side scripts ([[beef_integration|BeEF]]) be executed to gather more detailed information about the user?
 | Login Restrictions | If a landing page with a login is created: is it necessary to let the user submit the password or shall LUCY redirect the user to a different page before the full password is entered? Is it necessary to implement regular expressions on the login fields in order to avoid false positives? | Login Restrictions | If a landing page with a login is created: is it necessary to let the user submit the password or shall LUCY redirect the user to a different page before the full password is entered? Is it necessary to implement regular expressions on the login fields in order to avoid false positives?
 | Server Location | Should LUCY run in the cloud or on the client's premises? | Server Location | Should LUCY run in the cloud or on the client's premises?
  
general_planing.1463767852.txt.gz · Last modified: 2019/07/25 12:51 (external edit)