Why?
Companies are increasingly investing in securing their networks. They implement the best firewall, the most robust email security, and the most intelligent endpoint protection systems. In many cases, this prevents more than 95% of attacks. But what about that remaining 5%? Aren’t those the best-crafted emails? The targeted attacks because they have singled out your company? Sometimes, even suppliers or customers of large companies are targeted to approach their actual target. Furthermore, emails from partners are often considered more trustworthy and are usually whitelisted.
Apart from these methods, it’s easy for a hacker to conduct a broad, untargeted attack through personal emails. An enticing document that prompts for a Microsoft password upon download… The only Microsoft password the user knows is the one used at the office, so they try that, right? The username includes the domain, and Office 365 is accessible from anywhere. That’s as far as security goes.
This is just one possibility; if you think about it, there are dozens more.
Content
There are multiple attack techniques that hackers use to lure the reader into that one seemingly innocent click. Each one of these techniques is explained so they can be recognized. The goal is to train email users to automatically detect suspicious signals. The idea of “it won’t happen to me” must be eradicated.
The training is interactive, involving group questions as well as an online quiz system to keep attention sharp. Over the course of about ninety minutes, the audience’s awareness will grow, with some realizing they’ve narrowly escaped or are currently in the midst of an attack.
Some of the topics covered include:
- Recognizing the sender
- Too good to be true
- Unexpected timing
- Strange request
- …
Audience
This training is for anyone who receives messages, including emails, SMS, and WhatsApp.
Requirements
A smartphone is welcome, but a laptop is strictly forbidden. The smartphone is needed for participating in online quiz questions, while avoiding distractions from emails and other work is the reason for prohibiting laptops.