If you work in a large organization, you probably receive messages like this one on a regular basis.
Most of these messages come from cybercriminals, but a few are probably being sent by your information technology department to test how susceptible the organization is to malware attacks and phishing scams. Increasingly, IT departments are turning to in-house experiments of this kind to identify weaknesses in their technology systems and to educate users on the risks of infiltration.1
This content is available to paid Members of Starling Insights.
If you are a Member of Starling Insights, you can sign in below to access this item.
If you are not a member, please consider joining Starling Insights to support our work and get access to our entire platform. Enjoy hundreds of articles and related content from past editions of the Compendium, special video and print reports, as well as Starling's observations and comments on current issues in culture & conduct risk management.
Join The Discussion