![]() 07/17/2020 at 14:37 • Filed to: None | ![]() | ![]() |
It looks like our IT department is testing our employees again. They had an outside company send an “invoice reminder” with a link.
Yeah, right. Nobody should be sending me any invoices and I’m certainly not late on one. I did a little digging and it led me here:
Sorry, IT guys. You’ll have to try harder next time.
![]() 07/17/2020 at 14:45 |
|
TBH that’s kind of shitty. Maybe do a better job of educating your workforce on how to internet safely.
![]() 07/17/2020 at 14:48 |
|
The problem is that they DO train people on how to internet safely. But people don’t think and click on links and end up in the IT timeout corner for additional training. We’ve had a couple of company-wide virus outbreaks because of people clicking on bogus links.
![]() 07/17/2020 at 14:49 |
|
I tried the same thing earlier this week using this message. It went well.
![]() 07/17/2020 at 14:56 |
|
My company does this as phishing training. We all have a chrome extension that we use to flag these fake phishing emails (which also will flag real phishing emails for IT to handle). We click on one of the links in the fake emails and we have to retake the phishing training we all took during our onboardings.
![]() 07/17/2020 at 15:00 |
|
My company’s security department will randomly send out suspect emails as a test to see how many people will report it to them as a phishing attempt. The percentage you catch then becomes one of the things they look at during your annual performance review. If you delete enough of the emails without reporting them first it can actually influence your next raise.
![]() 07/17/2020 at 15:02 |
|
We do these a lot too - they’ve gotten much better to. I used to be able to just run a reverse DNS lookup on the name and it would route back to an internal IP making me laugh.
More recent ones have been timely like PTO expiration emails at the end of the year and so on.
Our place will even go as far as to fire you if you mess up enough of these after multiple trainings .
![]() 07/17/2020 at 15:06 |
|
That’s an interesting twist. We don’t have a reporting requirement. Maybe if we did and it were tied to my next raise, I’d put more effort into reporting them.
At this point, I’m doing well just to read all of my email. A PM got mad at me this morning because I missed one of the 20 emails she sent me this week and it contained a request for information she needed yesterday.
Whoops.
![]() 07/17/2020 at 15:10 |
|
our it guy just changes the passwords every couple months
then tapes the new password to the monitors on little laminated plaques
im thinking the dude has a pretty sweet gig going for himself...
welp...pointing out the security flaw is above my paygrade and im pretty sure the it guy knows.....sooo...its probably a management decision
![]() 07/17/2020 at 15:14 |
|
We get those from time to time.
07/17/2020 at 15:16 |
|
We get those periodically too. Once we got below a certain percentage of people actually clicking on the fake link s, management moved on to “Not clicking isn’t enough! W e want as close as possible to 100% reporting on phishing attempts!”.
![]() 07/17/2020 at 15:33 |
|
Yeah, we get one from our IT security people every couple months. Plenty of people who should know better are fooled.
Side note, I hope you didn’t click the link in the email to get to the explanation. Will hurt your IT’s security numbers, and may get you signed up for some remedial training.
![]() 07/17/2020 at 15:38 |
|
Invoicely?
Really?
![]() 07/17/2020 at 15:50 |
|
Nope. I know better. I looked at the headers to figure out the originating domain.
07/17/2020 at 16:01 |
|
07/17/2020 at 16:05 |
|
Gotta be as realistic as possible.
![]() 07/17/2020 at 16:09 |
|
Seems legit. If it had been a real scam, they would have asked for your SSN.
![]() 07/17/2020 at 19:51 |
|
sadly i have a co worker who isn’t that bright