If a single click on a phishing email can ruin the entire company, the blame doesn’t lie with that individual.

61 points

That individual ABSOLUTELY has a piece of the blame.

permalink
report
reply
5 points

Clicking a link isn’t supposed to have side effects, if it does someone else fucked up.

permalink
report
parent
reply
2 points

Welcome to corporate phishing emails, then, where the page that loads scolds you for being an idiot and submits your name to the boss for automated remedial phishing training, which must be completed lest it also tells HR…

permalink
report
parent
reply
28 points
*

In my time as a cybersecurity professional, my approach is always to blame the system, not the person.

If they clicked on a phishing link: 1) that email should never have reached their inbox, 2) that link should never have loaded, and 3) our awareness training is not up to snuff.

permalink
report
parent
reply
28 points

We have test-phishing mails sent by our IT-Sec team on a regular basis. There’s usually an obvious one and a better made one. First round 10% clicked the obv. one, 99% the good one.

We had a lot of trainings after that.

Last year the numbers went down to 5% and 80%.

If your security concept relies on both of these numbers being zero, you’re an incompetent hack trying to shift the blame on end users instead of doing your job.

permalink
report
parent
reply
13 points

Thank you, that was my point! Shifting the blame on the user doesn’t help anyone.

permalink
report
parent
reply
4 points

I’m so excited to see unpopular opinion puffin! 😁🎊🎉✨

permalink
report
reply
1 point

Maybe not finacilly or legally but image wise it can. Depending on the company and the people involved a company can 100% loose a lot image wise and in consequence, money wise

permalink
report
reply
40 points

“As an engineer, I reserve the right to click on the fake phishing emails from IT, just to see what they do.”

My boss: “…god dammit.”

permalink
report
reply
94 points

There are very few one click total compromises out there.

Most of the time clicking on the link will get to a phishing page to harvest credentials or prompt to download a zip or pdf which has the actual malware exploit/payload.

permalink
report
reply
40 points

True, in many cases there is a whole chain of vulnerabilities and misconfigurations, and everything starts with one phishing mail. For example:

  • successful phishing
  • VPN without 2FA, allowing the attacker access to company services
  • internal services with vulnerabilities, allowing the attacker to compromise a server
  • permission misconfiguration, allowing lateral movement

That was the point of this meme. It is not phishing alone that gets the company in trouble, its mostly a series of misconfigurations.

I think that in cyber security, we have to assume that phishing will be successful sometimes - and be prepared when it happens.

permalink
report
parent
reply
4 points

Yep and then whatever is trying to execute should be limited by user permissions, app whitelists, EDR / MDR, and a pile of other defenses.

permalink
report
parent
reply

Cybersecurity - Memes

!cybersecuritymemes@lemmy.world

Create post

Only the hottest memes in Cybersecurity

Community stats

  • 3.1K

    Monthly active users

  • 77

    Posts

  • 1K

    Comments