Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How CIOs Can Fight ‘Free Pizza!’ and Other Phishing Tricks
Cybersecurity

How CIOs Can Fight ‘Free Pizza!’ and Other Phishing Tricks

Cyber Security as a Business Enabler
Kenny MullicanBy Kenny MullicanDecember 15, 2021Updated:December 15, 20215 Mins Read
Facebook Twitter LinkedIn Email
Security Awareness to Detect Phishing Activity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In my last post on cybersecurity, I described how education and training were critical in stopping system breaches. This week, I discuss how CIOs can train their organizations’ workforce to be the first line of defense.

The primary way hackers gain access to business systems is through phishing techniques. Phishing—which refers to “fishing” for private information like social security numbers, contact information, or passwords—usually comes as an email enticing a user to urgently click on a link. When clicked, the link either attempts to download and install malicious software or takes the user to a website, tricking them into divulging information that will help the hacker to breach their system.

This can also take other forms, such as “vishing,” which uses voicemail or a voice call to get private information, but phishing is the most widely used and easiest to distribute on a wide scale, so I will focus on the tools that can help train users not to be fooled into helping the bad guys get in.

A Baseline Test

We begin with a baseline test to evaluate how likely our employees are to fall for the phishing tricks. This entails sending out a fake phishing email to each user. The email could be anything from “Your password is about to expire, please click here to update your account,” to “Free pizza! Click here to claim your prize,” to “Your UPS order could not be delivered, click here to login and update your status.”

When the user clicks on the link, it takes them to a website that has been established for this purpose. It usually displays some sort of message like: “This was a phishing test from your IT department. Had this been a real phishing email, you might have inadvertently allowed hackers to breach your system.” Then it logs the click into a database so the IT and security team can see a report of which and how many users fell for the trick. It is not uncommon for this baseline number to be very high. If users have not been trained to spot suspicious emails, this number could be as high as 25% or more.

Cybersecurity Training

Next, we roll out training to all users so that they won’t fall prey to this kind of attack. This can be done through in-person or virtual classes, or with online training that includes videos and short quizzes. The important thing is to make sure every employee understands what to look for in an email, the importance of being vigilant, and how they can help protect the company by thinking before clicking.

Simulated Phishing

Finally, we repeat the phishing simulation by sending out new emails to all users. These should be different every time, as we don’t want the user to spot them too easily. Now that they have been trained and are aware of how to spot the suspicious emails, the report of how many and which users clicked should be considerably lower. Any users who click on the simulated links should have some consequences like additional training.

These phishing simulations should continue indefinitely, with a cadence that you determine is appropriate for your company—weekly, every other week, or monthly. Over time, the percentage of users who click on simulated phishing links should continue to decline. Aim for 0% but know you may occasionally see one or two clicks.

Tools to Help Train Users

The CIO and IT team could potentially create custom training and simulated phishing emails, but this can be time-consuming. There are many vendors with solutions that automate this process, including baseline testing, awareness training, reporting methods, and response protocols.

Here are some popular choices:

KnowBe4 – https://www.knowbe4.com/

KnowBe4 was named a leader in the 2020 Forrester Wave for Security Awareness and Training Solutions, with the highest scores possible in 17 of the 23 evaluation criteria, including learner content and go-to-market approach. KnowBe4 applies “new school” security awareness training with its simulated phishing platform to help businesses manage the problem of social engineering.

PhishLabs – https://www.phishlabs.com/

PhishLabs Security Training modules are 5-minute “consumable” learning segments focused on a single cybersecurity topic. That makes it easy for employees to rotate through a library of micro-learning segments. PhishLabs offers training plans for sustainable learning and measured against KPIs. Modules are designed to intermix with simulated attack emails to drive awareness and positive behavioral changes.

Sophos – https://www.sophos.com/

Sophos’ security awareness program is part of a defense-in-depth strategy. Sophos Phish Threat educates and tests end users through automated attack simulations, security awareness training, and reporting metrics.

Infosec IQ – https://securityiq.infosecinstitute.com/

Infosec IQ treats employees as part of the solution, not the security problem. Infosec IQ offers a content library, security awareness resource center, and training plans to help organizations stay compliant, reduce phish incidents, and “inspire” employees to adopt better security practices.

Cyber Crime Cyber Security Cybersecurity channel featured phishing SMB CIO
Share. Facebook Twitter LinkedIn Email
Analystuser

Kenny Mullican

CIO
Paragon Films

Areas of Expertise
  • AI
  • Cloud
  • Data
  • IT Strategy
  • SMB CIO
  • Supply Chain
  • Website
  • LinkedIn

Kenny Mullican is a Cloud Wars Analyst focusing on cloud and AI strategy. As the current CIO of Paragon Films, Kenny analyzes the impact of technology on driving business, process, and customer value for mid-market companies. With expertise in automation, enterprise information architecture, and security, he offers valuable insights through his contributions, helping organizations leverage technology to enhance efficiency and effectiveness in their operations.

  Contact Kenny Mullican ...

Related Posts

AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

May 9, 2025

IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation

May 9, 2025

AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls

May 8, 2025

ServiceNow Re-Invents CRM for End-to-End Enterprise

May 8, 2025
Add A Comment

Comments are closed.

Recent Posts
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration
  • IBM Launches Microsoft Practice to Accelerate AI, Cloud, and Security Transformation
  • AI Agent & Copilot Podcast: JP Morgan Chase CISO Publicly Pushes for Stronger Security Controls
  • ServiceNow Re-Invents CRM for End-to-End Enterprise
  • Inside ServiceNow 2025: How AI, Strategic Partnerships, and Platform Unification Are Reshaping Enterprise IT

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.