If a single click on a phishing email can ruin the entire company, the blame doesn’t lie with that individual.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 months ago

    There are very few one click total compromises out there.

    Most of the time clicking on the link will get to a phishing page to harvest credentials or prompt to download a zip or pdf which has the actual malware exploit/payload.

  • MedievalPresent@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    While I somewhat agree, there are things even the best spam filters can’t filter and Zero-Day-CVEs that Sys-Admins can’t fix.

    On the other hand, the company should be confident in their backups, which in most cases should allow for a continuation of their activities.

    • gencha@lemm.ee
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      Adversaries are well prepared. Go restore your cold archive from tape, petabytes worth, see how long it’ll take you. See how much data you missed before the last snapshot.

      Ransomware is no joke and nobody is actually prepared for it.

    • hipsterdoofus@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      2 months ago

      In my time as a cybersecurity professional, my approach is always to blame the system, not the person.

      If they clicked on a phishing link: 1) that email should never have reached their inbox, 2) that link should never have loaded, and 3) our awareness training is not up to snuff.