Skip to Main Content
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
book

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

by Robin Dreeke, Michele Fincher, Christopher Hadnagy
April 2015
Intermediate to advanced content levelIntermediate to advanced
224 pages
5h 13m
English
Wiley
Content preview from Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Chapter 5Plan Your Phishing Trip: Creating the Enterprise Phishing Program

“Do or do not …there is no try.”

—Yoda in Star Wars Episode V: The Empire Strikes Back

Let's say you read the first four chapters and are saying, “Yep, I get it, and I 100 percent agree …now what?”

Believe it or not, I meet people like you every day. Companies who see what is happening in the world around us and realize there is a need for security. They understand that phishing, vishing, and social engineering are used in almost every attack, and they don't want to be the next statistic in the newspaper.

Many security professionals start with a quick Google search to find which vectors are being used the most. It doesn't take long to see that phishing is almost always at the top of the list. The next logical progression is to start searching for phishing education help.

One company might tell you, “Just use our templates and you will be amazed.” Another might say, “You must go super hard-core on your employees to scare them into shape.” Yet another might propose this wisdom: “If you embarrass and humiliate them, they will learn.” And a fourth company might suggest, “A balance between education and healthy fear is the best.”

How do you decide what to do? How do you decide what program can help you the best?

As mentioned in Chapter 4, Michele and I have sent—are you ready for this?—more than 3 million phishing e-mails in just the past year. With that many phishing e-mails under our belts, we have collected ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Detecting and Combating Malicious Email

Detecting and Combating Malicious Email

Julie JCH Ryan, Cade Kamachi
Tribe of Hackers Red Team

Tribe of Hackers Red Team

Marcus J. Carey, Jennifer Jin

Publisher Resources

ISBN: 9781118958483Purchase book