New Blog Post | Setting up a New Phish Simulation Program - Part One

%3CLINGO-SUB%20id%3D%22lingo-sub-2422625%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Setting%20up%20a%20New%20Phish%20Simulation%20Program%20-%20Part%20One%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2422625%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22JasonCohen1892_0-1623084158244.jpeg%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F286929i9A453BF9B0715376%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22JasonCohen1892_0-1623084158244.jpeg%22%20alt%3D%22JasonCohen1892_0-1623084158244.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fsetting-up-a-new-phish-simulation-program-part-one%2Fba-p%2F2412854%22%20target%3D%22_blank%22%3ESetting%20up%20a%20New%20Phish%20Simulation%20Program%20-%20Part%20One%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20modern%20enterprise%2C%20of%20any%20size%2C%20faces%20a%20complex%20and%20dangerous%20threat%20landscape.%20Compliance%20risk%20and%20security%20threats%2C%20both%20internal%20and%20external%2C%20have%20to%20be%20managed%20with%20a%20dizzying%20array%20of%20technologies%2C%20processes%2C%20and%20subject%20matter%20experts.%20The%20security%20industry%20and%20every%20major%20cloud%20service%20provider%20will%20tell%20you%20that%20end%20user%20phishing%20is%20the%20most%20common%20and%20most%20successful%20breach%20vector%20for%20any%20modern%20organization.%20Microsoft%20365%20Security%2C%20Compliance%2C%20Identity%2C%20and%20Management%20(M365%20SCIM)%20provides%20an%20integrated%2C%20holistic%20solution%20to%20these%20existential%20risks%2C%20including%20phish%20prevention.%20In%20this%20blog%2C%20we%20want%20to%20share%20our%20best%20practices%20for%20creating%20an%20effective%20and%20actionable%20end%20user%20phishing%20training%20program.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEvery%20organization%20should%20start%20with%20a%20robust%20technical%20solution%20to%20eliminate%20the%20vast%20majority%20of%20phishing%20attempts%20on%20your%20organization.%20Microsoft%20Defender%20for%20Office%20365%20is%20an%20excellent%20option.%20The%20organization%20should%20then%20focus%20on%20creating%20a%20robust%20and%20capable%20security%20operations%20and%20administration%20team%20that%20can%20react%20and%20respond%20to%20successful%20phishing%20attacks%2C%20which%20will%20inevitably%20happen.%20You%20should%20hire%20good%20security%20and%20compliance%20operators%2C%20and%20then%20equip%20them%20with%20the%20right%20tools%20and%20resources%20to%20manage%20those%20risks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFinally%2C%20we%20believe%20every%20organization%20should%20have%20a%20data-driven%20phish%20training%20and%20behavior%20modification%20program%20in%20place%20to%20help%20their%20employees%20first%20understand%20how%20to%20correctly%20identify%20phishing%20attempts%20and%20to%20help%20them%20take%20the%20correct%20action%20when%20those%20threats%20are%20identified.%20Below%2C%20we%20lay%20out%20our%20recommendations%20for%20appropriate%20program%20goals%2C%20resources%2C%20simulation%20construction%2C%20training%2C%20and%20measuring%20success.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2422625%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

JasonCohen1892_0-1623084158244.jpeg

Setting up a New Phish Simulation Program - Part One - Microsoft Tech Community

The modern enterprise, of any size, faces a complex and dangerous threat landscape. Compliance risk and security threats, both internal and external, have to be managed with a dizzying array of technologies, processes, and subject matter experts. The security industry and every major cloud service provider will tell you that end user phishing is the most common and most successful breach vector for any modern organization. Microsoft 365 Security, Compliance, Identity, and Management (M365 SCIM) provides an integrated, holistic solution to these existential risks, including phish prevention. In this blog, we want to share our best practices for creating an effective and actionable end user phishing training program.

 

Every organization should start with a robust technical solution to eliminate the vast majority of phishing attempts on your organization. Microsoft Defender for Office 365 is an excellent option. The organization should then focus on creating a robust and capable security operations and administration team that can react and respond to successful phishing attacks, which will inevitably happen. You should hire good security and compliance operators, and then equip them with the right tools and resources to manage those risks.

 

Finally, we believe every organization should have a data-driven phish training and behavior modification program in place to help their employees first understand how to correctly identify phishing attempts and to help them take the correct action when those threats are identified. Below, we lay out our recommendations for appropriate program goals, resources, simulation construction, training, and measuring success.

0 Replies
www.000webhost.com