How to Build and Deliver an Effective Phishing Awareness Campaign?
Based on the results of 1000’s of simulated phishing campaigns here are the top 5 most effective practices you can implement to reduce your risk today.
Following these best practices can help you ensure your testing is effective and can maximize your return on investment in the long-term.
While the phishing platform itself can provide a measured benefit of experience and expertise, and its latest features and tools, it is up to those within the company to hone each template and campaign to the needs of their organization.
The best practices for a phishing awareness campaign include:
Understand the threat
The threat of phishing may be universal, but each industry will have a varied proportion of risk from a diverse selection of threat actors.
Their motivations, intent, and even their applied methods and trends can be distinct, and therefore it is important to fully understand the who, the what, and the why before laying down your testing strategy.
Select templates and techniques based on these threats, and your own experience of past phishing incidents.
Create a baseline
Metrics tracking is important to understanding your progress; after all it is by converting theory to practice and ultimately habit, that security consciousness is achievable.
Know where you are beginning so that you can understand your current risk and thereby correctly strategize where you need to get to.
Typically, phishing testing begins with a simple (low sophistication) template and is advanced only when results show that mastery of a level has been achieved.
By beginning with a simple lure you can lay down a foundation of understanding at each level.
Once a low sophistication template from one of the email topic areas (e.g. home/ personal, business, or attachments) has been selected, it can be edited and customized to your particular needs.
Alternatively, some organizations like to launch their first campaign with a complex (high sophistication) email lure, and then use the high susceptibility results as validation for continued testing.
There is nothing wrong in this approach, as long as subsequent tests go back to a lower sophistication lure so that learning can progress naturally.
Customize Your Feedback
Beyond the selection of an email lure template, the user feedback message is one of the most important pieces of a phishing testing plan.
This “landing” page, which is either redirected to from an email lure template, or has been added as an attachment to said template, should at once communicate the error that was committed and simultaneously assure the recipient that the receipt was part of a secure test.
It is advisable to customize the user feedback message to include your corporate logo, and relevant corporate terminology.
It is also best practice to share direct learnings based on the respective template.
For example, call out the tell-tale signs of phishing that the email recipient should have identified: e.g. an inconsistent domain, a call to urgency, a promise too good to be true, or a threat too unrealistic.
Offer as well relevant suggestions and tips: e.g. hover over hyperlinks to review a URL prior to clicking, or be sure of the legitimacy of an attachment prior to downloading and opening it.
The User Feedback Message is an opportunity to provide direct phishing avoidance training material to those identified as most susceptible.
This opportunity can be extended with more formal training options like automatically enrolling susceptible individuals in required training, whether videos or computer based training options.
Track and Communicate
Phishing testing is not an exercise in instilling fear, and it should never be used as a means to ostracize or embarrass individuals.
However, in order to understand the progress of security maturation, it is relevant to track, analyze, and communicate phishing testing results.
Firstly, determine what is relevant for you to track. Which variables will add to your understanding of corporate security and susceptibility?
Information such as department, location, preferred languages, or even corporate rank may be especially relevant depending on the campaign.
Once data is gathered, it can be compared and tracked against industry benchmarks.
Use available reports to gather additional data points, like operating system and browser version.
Analyze your results from different angles and vantage points, then share your data summary with leadership and provide key learnings to the corporate body.
Some basic statistics that should be monitored include: overall susceptibility and the prevalence of repeat offenders.
The phishing testing program could also be incentivized to offer rewards to those individuals who show themselves to be exceptionally resistant to phishing.
Friendly competition can also be initiated between locations, regions, or departments, allowing for recognition of the most improved and least susceptible groups.
Set a Goal- Close the Gap
Once you have established a baseline, and begin to track your phishing testing results against industry benchmarks, it is important to set an improvement goal.
Working toward that goal will require practice, education, and awareness.
Timely phishing testing provides the real-world simulation practice that will help email recipients hone their skills.
It is important that testing occur steadily throughout the year, so that learnings aren’t forgotten.
Additional training opportunities, to individuals through reactive campaigns, or more formal group training campaigns to identified deficient departments or locations, can provide the direct learning needed to curb susceptibility.
If a plateau is reached further breakdown of data may be needed, to understand for example, if the device, way of working, or role may be playing a part in the increased risk.
If repeat offenders continue to click on multiple campaigns throughout a year, and initial training attempts have proven unsuccessful, it can then be appropriate to speak to the individual, their manager, and even Human Resources to create an individualized action plan.
The follow-ups should be conducted in private so as not to shame the individual, and should be focused on improving understanding rather than punishing errors.
Increase Complexity
Once metrics show that employees are able to detect and react appropriately to their current phishing complexity level: including avoiding, deleting, and or reporting/ escalating phishing emails, it is appropriate to raise the level of phishing complexity.
Ensure a wide-ranging selection of phishing topics, types, and techniques as you increase the sophistication level.
Routinely reassess the existing threat level and the propensity of risk associated with distinct threat actors, and hone your testing campaigns accordingly.
Beyond the highest general sophistication level, it is relevant to employ techniques used in spear phishing, including incorporating corporate news and social media headlines.