• @Solarius
    link
    1199 months ago

    sounds like the internal phishing service should be the one needing to do training

    • @doctordevice@lemm.ee
      link
      fedilink
      57
      edit-2
      9 months ago

      Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?

      I’ve worked a help desk before, while after dozens of people sending it in we don’t really need it forwarded anymore, people don’t know that until we get the I’d still rather people forward it than click it. Ignore and delete is best since I guarantee someone will forward it to IT, but forwarding (even forwarding and asking) is never bad and demonstrates good awareness.

      • @jcg@halubilo.social
        link
        fedilink
        179 months ago

        Yeah, I’m very confused by this. Why do the users notifying IT have to do the training?

        The URL likely is unique per user. They forward it, IT clicks the link, it registers that that user clicked the link even though IT did it.

      • @railsdev@programming.dev
        link
        fedilink
        7
        edit-2
        9 months ago

        Random but what I always wonder is: what’s the point of forwarding?

        Are we assuming they’re attaching the original email’s source so that the headers can be used to determine the source? Without that, the only thing useful I can think of would be any links in the email body.

        Asking because I’ve owned an email address or two that got leaked in data dumps so I go crazy tracking down the sending server’s owner, any companies they’re pretending to be, any domain registrars, etc. and a lot of that requires analyzing the headers.