![]() So, a phishing simulation that asks team members to click through to sign into their Avis account to fill out a survey, would meet the "contextually relevant" bar. If your team uses Avis rental cars when they travel, a well-timed survey from Avis is plausible. Contextually Relevant Call-to-Action: the call-to-action needs to be an action that your team would plausibly be asked to do, by the highly relevant sender.Does your team use Google Suite? A phishing simulation claiming to be from Google Suite will have a higher "Sender Relevance" to your team, than an account alert email out-of-the-blue from Microsoft Office 365 if that is not a product your team uses. Sender Relevance: the most effective phishing campaigns (and simulations) that we've seen, are ones that claim to be from vendors/partners/people that your team expects to hear from.3 Crucial Factors for Phishing Simulation EmailsĪ phishing simulation email that becomes a terrific learning experience for your team needs the following to be successful: A big part of staying safe from phishing attacks is to take a serious approach to running phishing simulations that give your team a very practical opportunity to test their skills at identifying safe versus unsafe emails.īut, what makes a great phishing simulation email? Below we'll share the key factors that make phishing simulation emails effective, and our favorite 113 phishing simulation emails that we use with our clients. If you follow this blog regularly, you know that it is no secret that we spend a lot of time writing about how to identify and protect against phishing attacks.
0 Comments
Leave a Reply. |