Phishing policy and training
Introduction
From time to time, the Information Security & Compliance team will organise simulated phishing attacks on PCI Pal staff. These are designed to raise staff awareness of the real threat of external phishing attacks, and will be followed up with coaching, training and actions to help staff identify phishes and defend themselves against attacks in the future.
When a phishing simulation is launched ideally the user should use the ‘Report Phish’ button within Window’s Outlook to identify a phish and therefore pass the simulation. Alternatively, phishes may be reported via Teams or email to the DPO.
In general, clicking on the hyperlink or attachment of a simulated phish, or entering account credentials into the phishing portal, will constitute failing the simulation.
This includes doing so after reporting the phish, or ‘just to see what it did’, or entering false credentials, or forwarding the phish to someone else who clicks/enters account credentials.
Where a user proves susceptible to a simulated phishing attack, certain remediation steps will be taken. Each time, the user must retake the Security Awareness training with the LMS within 1 week, which may be extended to 2 weeks at their line manager’s discretion. For each time the user responds to a phishing simulation over a rolling 6-month period;
1st time - DPO to discuss the specific phish with user and review what occurred
2nd time - CISO and/or People team to discuss with user and see if any broader solutions may be applicable e.g. specific/individual training, changes to existing processes
3rd time and beyond - User’s line manager informed and asked to have a conversation with user e.g. the specific phish, user’s workload at time of phish, any struggles or additional needs
e.g. – A user clicked on two phishes previously in January and June.
It is now October and they have just clicked on another phish.
As January is now more than 6 months ago, this would be their 2nd instance of responding to a phish in the past 6 months, and so the response would involve a discussion with the CISO.
The ISC team is not interested in “Naming and Shaming”, but rather in ensuring staff are secure and aware online. If you feel you would benefit from a one-to-one to review phishing threats and how to protect yourself, please do reach out to any member of the ISC team at any time.
Discussion Guidance for Phishing Susceptibility
When discussing a phish with a colleague that responded to the phish, it is important that this is not phrased or considered as a failure. Phishing attacks are designed to take advantage of a person's blind spots and our general drive to act, help, and get work done.
Listed below are some topics to help both the line manager and individual reflect upon the circumstances that led them to respond to a phish, and identify steps that could be taken to reduce the risk in future. In addition, the InfoSec team can provide with a safe copy of the phish and, if a simulation, of any relevant statistics.
Note the time when the phish was sent, when it was read by them, and note when they respond to the phish:
-
If there was very little time between them receiving the phish and responding to it, ask them if they fully read the phish prior to responding
-
Check if they had any meetings or a heavy workload around that time. Did they feel rushed due to time pressure?
-
Note whether they had reported the phish to ISC
Open the copy of the phish and ask them to go through their thought process/what they looked at:
-
If a phishing simulation, go through any other ‘hints’ InfoSec has provided that your colleague didn’t mention previously
-
Do they seem like they understand why the other ‘hints’ are warning signs? Do they seem confident they can spot such ‘hints’ in future? If not, InfoSec may be able to help explain and teach.
Asking them if there were any steps they have thought of or are willing to try in future to defend themselves? Examples include, but are not limited to;
-
Looking for the ‘External’ banner on emails,
-
Taking 30 seconds to fully review all emails from new contacts or from new services before responding in any way,
-
For emails supposedly from or on-behalf of an internal service or colleague, checking if it is legitimate with the appropriate internal contact via Teams