logo_lightAlogo_lightlogo_light
  • About
  • Products
  • Pricing
  • Knowledge Base
  • Login
  • Products
  • Solutions
  • Search
ethical employee vulnerability management and pitfalls of phishing assessments
[et_pb_section fb_built=”1″ _builder_version=”4.4.6″ custom_padding=”0px|||||” da_disable_devices=”off|off|off” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.4.6″ custom_padding=”||8px|||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

Security professionals have tested networks to identify vulnerabilities for many years now. It’s a common practice called “Vulnerability Analysis and Penetration Testing”, or sometimes “Ethical Hacking”. The word ethical in this context is interesting, as it indicates that the hacking is being done for good reasons, not malicious ones.

But we forget that “ethics” is all about actions toward humans. Usually, ethical hacking of networks is done by an independent group, or a third party, with the staff who run a network being kept unaware that testing is being done, so it they don’t prepare abnormally and skew the results. These tests don’t usually get personal.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”4.4.6″ custom_padding=”5px||8px|||”][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″]

But as we learned recently in the Chicago Tribune phishing assessment fiasco that hit Twitter and then the mainstream news, it’s hard to transfer that philosophy of “ethical hacking” on networks, to testing employees on their human vulnerabilities.

But many organizations do this, and vendors are making it easier to do more frequently.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”4.4.6″][et_pb_video src=”https://youtu.be/Q40Pjnj2smk” _builder_version=”4.6.5″ hover_enabled=”0″ sticky_enabled=”0″][/et_pb_video][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″ custom_padding=”8px|||||”][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_text _builder_version=”4.6.5″ _module_preset=”default”]

Here are just a few reasons why phishing assessments that use “live phishing emails”, as many companies do right now, can be ineffective, or worse, counter-productive. There are actually a number of other reasons why you may not get the results you are looking for from ongoing live phishing assessments, but I can cover those in another video.

So, here I will discuss the issues that I see as being related directly to the human ethics side of phishing assessments…

First, Employees have emotions, and that’s what attackers target to get them to take actions. When we do that intentionally, as a test, we are literally playing with peoples emotions, which makes them feel like they are being unfairly targeted by their employer.

That’s not good for morale, and can cause distrust of the employer.

Secondly. When a person is manipulated with a situation they think is real, you can’t predict how they will react because they are human. When testing networks, a failure may cause system outages or corruption of data. But the limits of damage are fairly predictable.

In contrast, as we saw at the Tribune, employees may go straight to the media or to law enforcement with public comments or complaints. Or they may even retaliate physically. Nobody knows, and that’s a big risk many organizations don’t think about when they deploy live phishing assessments.

Thirdly. Even when management is actively involved in screening phishing messages, the results can be skewed because they will forbid any tests that could cause potential backlash or unwanted outcomes. This is becoming even more of a problem, because attackers don’t play by the same rules, and have no hesitation in using those very topics in their attacks, knowing that employees are unlikely to have seen them before in a phishing test.

Often, the answer coming from the companies that sell live phishing assessments is that “you need to be careful about how messages are crafted, to be ‘close’ to those used in real attacks, without going over some ethical line.” This is a real limitation of the whole methodology of targeting employees with frequent live phishing assessments, to assess human vulnerability.

Now, I’m not saying that live phishing assessments have no value. Far from it. But I see them more as an occasional audit tool, not as an ongoing barrage of tests that rile up employees.

So, what can be done to assess the real ability of employees without causing negative consequences?

Gamified learning and assessment actually provides the means for conducting what I call “Ethical Employee Vulnerability Management”. With this approach, not only do employees know they are not being targeted, but they see it more as a fun competition. You can use any topics you want, and all employees who take a training module see the same content, so everything is under control, with no unexpected or unwanted side-effects.

And most importantly, you can train people on the most risky situations and allow them to practice in a safe environment, in order to improve their scores and proficiency.

Gamification is widely recognized as the most effective way to improve employee engagement, but most solutions don’t do it in a positive and deep way that drives deep engagement and knowledge retention. When gamified learning is used for “ethical employee vulnerability management”, it has not only more reliable and meaningful results, but also drives a more positive security culture, where employees trust management.

To learn how you can implement Ethical employee vulnerability management using the Click Armor Active Awareness platform for phishing awareness training and assessment, contact me at clickarmor.ca/contact

You can do a free trial with your own private area for a few employees with your own private leaderboard, to see how well it works and how easy it is to manage.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”4.4.6″][et_pb_column type=”4_4″ _builder_version=”4.4.6″][et_pb_post_nav prev_text=”Previous Post” next_text=”Next Post” _builder_version=”4.4.6″ title_text_color=”#ffffff” background_color=”rgba(14,79,136,0.68)” custom_padding=”5px|10px|5px|10px|true|true” border_radii=”on|4px|4px|4px|4px” border_width_all=”1px”][/et_pb_post_nav][/et_pb_column][/et_pb_row][/et_pb_section]
Share
0
[vc_empty_space height="40px"] [vc_row][vc_column width="1/2"][vc_column_text css=""]

Subscribe to our newsletter

Stay up-to-date with the latest news, promotions, and offers from Click Armor.
Follow us on Linkedin

You can unsubscribe at any time

[/vc_column_text][/vc_column][vc_column width="1/2"][vc_column_text css=""][vc_empty_space height="10px"]Subscribe [/vc_column_text][/vc_column][/vc_row]

Click Armor helps business managers battling cyber and compliance risks by using gamified simulations and challenges to engage end-users to avoid breaches and build a strong security culture.

[vc_empty_space height=”0px”]

[elfsight_social_icons id=”4″]

Recent Articles

  • Role-Based Targeted Threats: The Phishing Problem Traditional Training Can’t Solve June 16, 2025
  • Addressing AI opportunities and risks in your cyber security program March 13, 2025

Resources


[vc_row][vc_column width=”1/2″][vc_column_text css=””]
News & Insights
Partner and MSP Program
Gamified Learning
About Click Armor
Our Team
Careers
Pricing
[/vc_column_text][/vc_column][vc_column width=”1/2″][vc_column_text css=””]

Take Assessment
Can I be phished?
Community Forum
Contact


Student Login

[/vc_column_text][/vc_column][/vc_row]

© Copyright All Rights Reserved • Click Armor Corp. | Privacy policy • Terms of use