cron to Cybersecurity - Memes@lemmy.worldEnglish · edit-24 months agoDoes your company do phishing simulations?imagemessage-square33fedilinkarrow-up1195arrow-down11file-text
arrow-up1194arrow-down1imageDoes your company do phishing simulations?cron to Cybersecurity - Memes@lemmy.worldEnglish · edit-24 months agomessage-square33fedilinkfile-text
minus-squareAPassenger@lemmy.worldlinkfedilinkarrow-up4·edit-24 months agoThat’s the odd thing with where I work, until recently all the phishing simulations were from within the company domain and so lacked the [External…] It’s not impossible for an already infiltrated network, but I still expect to see that it came from outside. Maybe that’s me, tho. Wdits: spullings <- like those
minus-squareclif@lemmy.worldlinkfedilinkarrow-up1·4 months agoWow, that is impressively sneaky to use the legitimate domain.
That’s the odd thing with where I work, until recently all the phishing simulations were from within the company domain and so lacked the [External…]
It’s not impossible for an already infiltrated network, but I still expect to see that it came from outside. Maybe that’s me, tho.
Wdits: spullings <- like those
Wow, that is impressively sneaky to use the legitimate domain.