IT managers fail to anticipate employees’ reactions. Employee phishing tests can, and do, leak “into the wild” and cause your business trouble.
The unexpected employee reactions to phishing tests cost time, effort and sometimes money to counteract. When faced with a live phishing test employees might take one of these three actions:
1. Contacting an impersonated entity instead of the help desk
Contacting an impersonated entity (internal or external) rather than the help desk costs that organization and may damage both organizations reputation. (Remember the story about DOJ and Thrift Savings Plan.)
2. Contacting the news or social media to vent their emotions
Employees contacting news or social media will definitely cause an impact on reputation of the organization, and may require PR or legal damage control.
Photo via Getty Images + Unsplash+
For just $325 USD, you can run a 6 week, automated program for gamified phishing awareness training and challenges. (Limited time offer. Normally valued at $999 USD)
Use Promo Code: 6WEEKS
3. Contacting other employees to warn them of the test
Contacting other employees to warn them may sound good because “it’s a behavior you want”, but it may not help when spear-phishing attack hits employees who were “tipped off” during a test. It can cost the price of an attack in the end.
Technical vulnerability assessments are easier to predict impacts and mitigate. We shouldn’t treat phishing tests the same as we do other vulnerability assessments, when the cost to mitigate unexpected outcomes is much higher.
Scott Wright is CEO of Click Armor, the gamified simulation platform that helps businesses avoid breaches by engaging employees to improve their proficiency in making decisions for cyber security risk and corporate compliance. He has over 20 years of cyber security coaching experience and was creator of the Honey Stick Project for Smartphones as a demonstration in measuring human vulnerabilities.