{"id":2316,"date":"2017-02-02T14:48:28","date_gmt":"2017-02-02T14:48:28","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2316"},"modified":"2020-05-27T12:03:06","modified_gmt":"2020-05-27T12:03:06","slug":"why-you-should-scam-your-own-employees","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2316","title":{"rendered":"Why You Should Scam Your Own Employees"},"content":{"rendered":"<p style=\"text-align: justify;\">Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees.<\/p>\n<p style=\"text-align: justify;\">Simulating <a href=\"https:\/\/tsisupport.com\/tsistaging\/avoid-getting-hooked-this-phishing-season\/\">phishing attacks<\/a> provide a quantifiable insight at precisely how employees interact with suspicious attachments and\/or links received in their Inbox. While most employers miscalculate the degree of how much of their workforce can be coerced into clicking on unknown links, the results are irrefutable.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>\u201cTricks\u201d Aren\u2019t Just for Kids Anymore<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">One of the largest caveats to overcome when discussing ethical <a href=\"https:\/\/tsisupport.com\/tsistaging\/avoid-getting-hooked-this-phishing-season\/\">phishing<\/a> simulations is with decision-makers who don\u2019t wish to \u201ctrick\u201d employees because it is embarrassing or makes them look bad.\u00a0 While it is certainly a perspective to consider, another way to look at it is \u201cenlightening\u201d employees to garner a heightened level of awareness and security.\u00a0 The enormous amount of damage a single breach can incur for a business in damage, cost, and headache are immeasurable.<\/p>\n<p style=\"text-align: justify;\">While organizations should never point-out individuals on the pretense of embarrassing them among peers, there is a strategy you can implement to confidently correct end-users who are click-happy, and thus endangering your network.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Results &amp; Next Steps<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">The old-school days of gathering employees in a room to view a PowerPoint presentation on the pretense of free donuts and coffee just doesn\u2019t work anymore.\u00a0 Information doesn\u2019t get absorbed, and often employees spend the time fiddling with their mobile devices, doodling on a notepad, or blankly staring until their eyes glaze over.<\/p>\n<p style=\"text-align: justify;\">To have a more meaningful result, utilize the findings in the <a href=\"https:\/\/tsisupport.com\/tsistaging\/avoid-getting-hooked-this-phishing-season\/\">phishing<\/a> simulation to develop a training program on ways to spot malicious links and\/or attachments which could be infected with malware.\u00a0 Today, the likelihood of the attachment containing <a href=\"https:\/\/tsisupport.com\/tsistaging\/what-to-do-during-a-ransomware-attack\/\">Ransomware<\/a> which encrypts the workstation and\/or network is considerable.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Final Thought<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">To effectively fight the onslaught of cybercrime, you need an educated workforce.\u00a0 Social Engineering Defense is not a course taught in most Universities, it is up to you to cultivate a workplace culture that understands it is everyone\u2019s responsibility to protect the data your business holds dear.<\/p>\n<p style=\"text-align: justify;\">TSI partners with industry leaders to provide unmatched phishing campaign development, as well as thorough training resources to educate our clients workforce.\u00a0 Want to Schedule a Consultation to discuss end-user\/network security? <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[173,326,132,327,294,54],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why You Should Scam Your Own Employees - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why You Should Scam Your Own Employees - TSI Support\" \/>\n<meta property=\"og:description\" content=\"Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2316\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-02T14:48:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-27T12:03:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316\",\"name\":\"Why You Should Scam Your Own Employees - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png\",\"datePublished\":\"2017-02-02T14:48:28+00:00\",\"dateModified\":\"2020-05-27T12:03:06+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2316\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2316#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why You Should Scam Your Own Employees\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why You Should Scam Your Own Employees - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why You Should Scam Your Own Employees - TSI Support","og_description":"Identifying network vulnerabilities, as well as the right tools to address them, have become of major concern to many organizations. According to industry leaders, businesses should consider a rather unorthodox approach to educating and identifying exactly how prone they are to a data breach, scam their employees. Simulating phishing attacks provide a quantifiable insight at&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2316","og_site_name":"TSI Support","article_published_time":"2017-02-02T14:48:28+00:00","article_modified_time":"2020-05-27T12:03:06+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2316","name":"Why You Should Scam Your Own Employees - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png","datePublished":"2017-02-02T14:48:28+00:00","dateModified":"2020-05-27T12:03:06+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2316"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/02\/Scam-Employees-Website.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2316#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Why You Should Scam Your Own Employees"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2316"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2316"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8521"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}