On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, and many more. And, of course, to various aspects of cybersecurity, including red teaming, purple teaming, Capture-The-Flag (CTF) contests, and tabletop exercises. Is phishing any different?

The answer: it’s not, at least in theory. It all comes down to execution, and we’ve seen several mistakes organizations make when implementing phishing training. Four of the most common, in our experience, are:

  • Making phishing simulations an exercise in tick-box compliance, without putting much thought into the design of campaigns, the quality of the lures, or the cadence of simulations …

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help