SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
10 STEPS
to Creating a
Corporate Phishing
Awareness Program
Phishing awareness programs help
enterprises protect themselves
from phishing scams and breaches.
It’s a highly effective way of
educating employees and helping
them spot phishing attacks.
The ins and outs of
such a program depend
very much on the
company, but here’s a
basic outline of a typical
program to give you an
idea of what’s involved.
Write a phishing e-mail
that is realistic, current,
and relevant and
isn’t psychologically
damaging to your staff
Run that e-mail
through the appropriate
departments (such as
HR and legal) to get
approval, which will
likely involve edits
and new iterations
Ensure your lists are
updated—adding new
hires and removing
those who have left
the company
Prepare a proper
educational landing page
for people who click
on the phish
Load the system you
will use with the e-mail
lists, phishing e-mail,
and landing pages
Schedule and test the
sending of the e-mail
Ensure the e-mail is sent
without any problems
Collect all data, which
might include number
of clicks, number of
people who report the
phish, and so on
26
15 8
Report on the data,
giving information
in regard to positive
or negative trends
26
15 8
Repeat the process
each month or quarter
As you can see, this is not a part-time
job. Maybe you can hire someone to
help you run this program internally or
you might have someone on staff that
is perfect for the job. But if you don’t
have the staff, skill, or desire
to run a phishing program
internally then a consultant
will be able to run it for you.
For more on setting up
and running a corporate
phishing program, check out
PHISHING
DARK WATERSThe Offensive and Defensive
Sides of Malicious E-mails
by Christopher Hadnagy and Michele Fincher

Mais conteúdo relacionado

Mais procurados

PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
vineetkathan
 

Mais procurados (20)

Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 
Phishing
PhishingPhishing
Phishing
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing
PhishingPhishing
Phishing
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing attack till now
Phishing attack till nowPhishing attack till now
Phishing attack till now
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 

Destaque

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emails
butest
 

Destaque (14)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!Don’t Get Caught by Phishing Emails!
Don’t Get Caught by Phishing Emails!
 
PCI Password Policy Compliance
PCI Password Policy CompliancePCI Password Policy Compliance
PCI Password Policy Compliance
 
Learning to Detect Phishing Emails
Learning to Detect Phishing EmailsLearning to Detect Phishing Emails
Learning to Detect Phishing Emails
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
The Phishing Ecosystem
The Phishing EcosystemThe Phishing Ecosystem
The Phishing Ecosystem
 
Dns security threats and solutions
Dns security   threats and solutionsDns security   threats and solutions
Dns security threats and solutions
 
Deloitte Maverick 2015 - Regional Round - TAPMI - Imagine Dragons
Deloitte Maverick 2015 - Regional Round - TAPMI - Imagine DragonsDeloitte Maverick 2015 - Regional Round - TAPMI - Imagine Dragons
Deloitte Maverick 2015 - Regional Round - TAPMI - Imagine Dragons
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP Phishing Forensics - SnowFROC - Denver Chapter of OWASP
Phishing Forensics - SnowFROC - Denver Chapter of OWASP
 
Differential learning SnowFROC 2017
Differential learning SnowFROC 2017Differential learning SnowFROC 2017
Differential learning SnowFROC 2017
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 

Semelhante a 10 Steps to Creating a Corporate Phishing Awareness Program

Fraud Report, Steinkamp, July 2014
Fraud Report, Steinkamp, July 2014Fraud Report, Steinkamp, July 2014
Fraud Report, Steinkamp, July 2014
Ron Steinkamp
 
Agree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docxAgree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docx
simonlbentley59018
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINAL
Sally Ewalt
 
Anti-Fraud 1Anti-Fraud PreventionName.docx
Anti-Fraud     1Anti-Fraud PreventionName.docxAnti-Fraud     1Anti-Fraud PreventionName.docx
Anti-Fraud 1Anti-Fraud PreventionName.docx
rossskuddershamus
 

Semelhante a 10 Steps to Creating a Corporate Phishing Awareness Program (20)

Fraud Report, Steinkamp, July 2014
Fraud Report, Steinkamp, July 2014Fraud Report, Steinkamp, July 2014
Fraud Report, Steinkamp, July 2014
 
Agree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docxAgree or disagree SMBs deal with various types of informatio.docx
Agree or disagree SMBs deal with various types of informatio.docx
 
10 things your infusionsoft team can and should be doing for you
10 things your infusionsoft team can and should be doing for you10 things your infusionsoft team can and should be doing for you
10 things your infusionsoft team can and should be doing for you
 
Dialog Health - HR eBOOK - How to use texting to engage, support and guide em...
Dialog Health - HR eBOOK - How to use texting to engage, support and guide em...Dialog Health - HR eBOOK - How to use texting to engage, support and guide em...
Dialog Health - HR eBOOK - How to use texting to engage, support and guide em...
 
How Can You Automate Law Firm Marketing?
 How Can You Automate Law Firm Marketing? How Can You Automate Law Firm Marketing?
How Can You Automate Law Firm Marketing?
 
ICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme InfosheetICFE Fraud Risk Management Programme Infosheet
ICFE Fraud Risk Management Programme Infosheet
 
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
CXO 2.0 Reviews Common Scams Targeting Growing Businesses & Legit Prevention ...
 
automation software.docx
automation software.docxautomation software.docx
automation software.docx
 
Payroll as a Value Driver
Payroll as a Value DriverPayroll as a Value Driver
Payroll as a Value Driver
 
The Connected Digital Economy and Benchmarking for Competitive Advantage - Hu...
The Connected Digital Economy and Benchmarking for Competitive Advantage - Hu...The Connected Digital Economy and Benchmarking for Competitive Advantage - Hu...
The Connected Digital Economy and Benchmarking for Competitive Advantage - Hu...
 
Cracking The Payroll Management Code
Cracking The Payroll Management CodeCracking The Payroll Management Code
Cracking The Payroll Management Code
 
Payroll business for small owners
Payroll business for small ownersPayroll business for small owners
Payroll business for small owners
 
How Background Screening Helps in Improving Remote Candidate Experience
How Background Screening Helps in Improving Remote Candidate ExperienceHow Background Screening Helps in Improving Remote Candidate Experience
How Background Screening Helps in Improving Remote Candidate Experience
 
Synthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINALSynthetic ID Fraud DetectionFINAL
Synthetic ID Fraud DetectionFINAL
 
Payroll Webinar: Payroll Fraud Sleuth Training
Payroll Webinar: Payroll Fraud Sleuth TrainingPayroll Webinar: Payroll Fraud Sleuth Training
Payroll Webinar: Payroll Fraud Sleuth Training
 
Anti-Fraud 1Anti-Fraud PreventionName.docx
Anti-Fraud     1Anti-Fraud PreventionName.docxAnti-Fraud     1Anti-Fraud PreventionName.docx
Anti-Fraud 1Anti-Fraud PreventionName.docx
 
Ten Tips to Help You Control Your Employee Spending
Ten Tips to Help You Control Your Employee SpendingTen Tips to Help You Control Your Employee Spending
Ten Tips to Help You Control Your Employee Spending
 
5-Step Email Marketing Plan
5-Step Email Marketing Plan5-Step Email Marketing Plan
5-Step Email Marketing Plan
 
Srt ultimate guide_onboardingv2 (1)
Srt ultimate guide_onboardingv2 (1)Srt ultimate guide_onboardingv2 (1)
Srt ultimate guide_onboardingv2 (1)
 
Is Text Marketing Suitable For Your Company 4 Things You Need To Know
Is Text Marketing Suitable For Your Company 4 Things You Need To KnowIs Text Marketing Suitable For Your Company 4 Things You Need To Know
Is Text Marketing Suitable For Your Company 4 Things You Need To Know
 

Mais de Wiley

5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
Wiley
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
Wiley
 

Mais de Wiley (20)

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

10 Steps to Creating a Corporate Phishing Awareness Program

  • 1. 10 STEPS to Creating a Corporate Phishing Awareness Program
  • 2. Phishing awareness programs help enterprises protect themselves from phishing scams and breaches. It’s a highly effective way of educating employees and helping them spot phishing attacks.
  • 3. The ins and outs of such a program depend very much on the company, but here’s a basic outline of a typical program to give you an idea of what’s involved.
  • 4. Write a phishing e-mail that is realistic, current, and relevant and isn’t psychologically damaging to your staff
  • 5. Run that e-mail through the appropriate departments (such as HR and legal) to get approval, which will likely involve edits and new iterations
  • 6. Ensure your lists are updated—adding new hires and removing those who have left the company
  • 7. Prepare a proper educational landing page for people who click on the phish
  • 8. Load the system you will use with the e-mail lists, phishing e-mail, and landing pages
  • 9. Schedule and test the sending of the e-mail
  • 10. Ensure the e-mail is sent without any problems
  • 11. Collect all data, which might include number of clicks, number of people who report the phish, and so on 26 15 8
  • 12. Report on the data, giving information in regard to positive or negative trends 26 15 8
  • 13. Repeat the process each month or quarter
  • 14. As you can see, this is not a part-time job. Maybe you can hire someone to help you run this program internally or you might have someone on staff that is perfect for the job. But if you don’t have the staff, skill, or desire to run a phishing program internally then a consultant will be able to run it for you.
  • 15. For more on setting up and running a corporate phishing program, check out PHISHING DARK WATERSThe Offensive and Defensive Sides of Malicious E-mails by Christopher Hadnagy and Michele Fincher