ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is It Fair to Be Fired for Falling for a Phishing… Test?

Is It Fair to Be Fired for Falling for a Phishing… Test?

Let’s run through a quick scenario: your company’s computing infrastructure is infected with ransomware. Fortunately, you have an offsite backup, so you are able to restore your systems without too much trouble, other than the time you’ve lost. As you investigate the root cause, you discover that one of your employees allowed the ransomware in by falling for a phishing email. So, do you fire them?

Now, what if the whole situation was actually just a test, with you pulling the strings? Do you fire them then?

If the concept of terminating someone for falling for a simulated phishing attempt doesn’t sit with you quite right, you're not alone. Many cybersecurity and phishing experts feel the same way.

What Is the Purpose of a Phishing Test?

Let’s consider why you would want to run a phish test in the first place.

Naturally, you want your business to be as secure as possible -- that only makes sense, especially given how prevalent threats are nowadays. Between January 1, 2005 and April 18, 2018, there were 8,854 reported breaches. This averages out to almost two every day - and again, these are just the breaches that were reported. Who knows how many companies managed to sweep their security failings under the rug, or simply shut their doors without explanation?

Your security only becomes more crucial when you consider how effective a tool phishing has proven to be for cybercriminals, and how prevalent these attacks are. While only 1.2 percent of all global email is seen as suspicious, that’s still a worldwide total of at least 3.4 billion phishing messages sent every day.

Furthermore, except in the case of spear phishing, phishing attempts take relatively little effort for a cybercriminal to put together (part of the reason that they are so common). Spear phishing is arguably more dangerous, as these targeted attacks require the cybercriminal to do some research and customize their attack to their target, which makes their attempt much more convincing.

So, with phishing attacks becoming so common, it is extremely important that your staff is able to identify them. Hence phishing tests, which allow you to evaluate your staff’s present abilities in a simulated scenario. Take note: phishing tests are designed to evaluate abilities, not competencies, which is an important distinction to observe while examining the prospect of firing employees who fail phishing tests.

What Some Companies Do (And What Security Experts Think)

Some companies out there demonstrate a very low tolerance for failed phishing tests. This is especially true in the financial industry, but that is the outlier among all industries, and for reasons that are pretty understandable. However, there are those companies that will terminate employees who fail too many (however many that may be) of these evaluations. Others will launch these attacks for the sake of keeping their employees on their toes.

Unfortunately for these companies, what they fail to realize is that these kinds of behaviors will do nothing to improve their security. Sure, firing someone who has a hard time recognizing a phishing email means that individual won’t subject your company to that particular threat, but who’s to say that the next person hired will be able to recognize them any more consistently? Can the rest of your staff actually absorb that employee’s responsibilities? Not to mention, just firing someone will do nothing to actually educate them on phishing, which means that another business (that could very well have some of your information on file) might be the next to hire that employee, and could find themselves breached as a result.

You also need to consider the stress that this puts on your employees, demoralizing them and making them resentful toward you -- the employer who keeps trying to catch them in a mistake without any constructive follow-up provided. 

Finally, think about how the threat of consequences might influence an employee’s decisions. Many solutions offer the option to report suspected phishing, and many employees (even if they’ve already clicked on the link) will still report them. At least, that’s what should happen… but if there are consequences that may come back to them for their mistake, they lose the motivation to report it. Why would they open themselves up to suspicion when their job could be on the line?

In short, your employees won’t trust you enough to tell you the truth.

How to Approach Phishing Tests Instead

Surprising your staff with an unannounced phishing test is an okay thing to do, as long as it is accompanied by a review of the results and follow-up training to help them improve, rather than a pink slip.

There’s also a lot to be said about leveraging positive reinforcement after a phishing test, rather than focusing on the negative. Rewarding the department that performs the best with a small bonus or gift cards will motivate everyone to be more vigilant, as there is a potential reward at stake for doing well. However, if you really want to hammer home the real-world consequences of phishing, gamification can be an effective way to do so while still motivating your employees. Rather than the carrot of a gift card, you could give the lowest-scoring team some kind of stick--like the responsibility of buying lunch for the rest of the team one day. While this will still sting, it is less extreme than termination and better communicates the actual consequences of phishing.

If you need help running a phishing test, reach out to ClearView IT. We can help advise you and your team on how to avoid phishing scams and other security risks by identifying them before it is too late. Give us a call at 866-326-7214 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Microsoft Office Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media Users VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Browser Managed Service Windows 10 Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows Business Technology Blockchain Bandwidth Encryption Mobile Device Management Server Remote WiFi Information App Virtualization Spam History Budget Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 BDR Health Cybercrime Wi-Fi Analytics Conferencing Access Control Big Data Data Security Voice over Internet Protocol Document Management Hacker Employer-Employee Relationship Save Money IT Management Training Compliance Remote Computing Help Desk Patch Management Hacking Cost Management Vendor Remote Monitoring Mobile Office Data storage Search... Money Best Practice Managed Services Customer Service Unified Threat Management Firewall Retail Alert Augmented Reality Data loss Word Hiring/Firing BYOD Outlook IBM Website Computing Password Vendor Management Hard Drive Applications Project Management Legal Vulnerabilities Monitoring Remote Workers Running Cable Healthcare Websites Windows 7 Free Resource Meetings Storage Mobility Sports Travel Social SaaS DDoS Virtual Reality Social Engineering How To Google Maps Cryptocurrency Black Market Scam iPhone Cleaning Education Cortana Robot User VPN Content Filtering Update Router Chrome The Internet of Things Data Breach YouTube Paperless Office Twitter Antivirus Windows 11 Law Enforcement Mobile Computing Maintenance Laptop End of Support Printer Marketing Downtime Multi-factor Authentication Customer Relationship Management Hack Safety Identity Theft Start Menu Computer Care Co-Managed IT Downloads Managed Services Provider Notifications Entertainment Unified Communications Virtual Private Network Virtual Desktop Vulnerability Saving Time Experience Google Docs Software as a Service Bluetooth Bitcoin Distributed Denial of Service Current Events Data Protection Computers Office Tips Private Cloud Telephone Solutions Memory Disaster Integration Images 101 Excel HIPAA Display Politics Machine Learning Settings Lithium-ion battery Tech Terms Employees Solid State Drive Managed IT Avoiding Downtime Virtual Assistant Processors Digital Holidays Drones Taxes Chromebook Cooperation Video Conferencing Automobile PowerPoint Processor Virtual Machines Administration Computer Repair How To Physical Security Presentation Wireless Technology Microchip Flexibility Professional Services Specifications eWaste IT Consultant Memes Reliable Computing Touchscreen Workplace Heating/Cooling Writing Environment Computer Malfunction Fake News Human Resources Net Neutrality Windows XP Emergency Proxy Server Emails Social Networking Vendor Mangement Service Level Agreement Computing Infrastructure Financial Data IT Scalability Management Scams Samsung Device security Computer Accessories Risk Management Webcam Microsoft Excel Google Apps Administrator Text Messaging Uninterrupted Power Supply Wireless Headphones Proactive IT Bring Your Own Device Business Mangement Going Green Business Cards Telework Tech Communitications Error Microsoft 365 Cables Tablets Smartwatch Music Procurement Bookmark Staffing Download Supercomputer Piracy FinTech Google Calendar Term IT Assessment Virus Point of Sale IP Address HTML CES Motion Sickness Supply Chain Management Botnet Browsers Value Nanotechnology Rental Service Google Drive Upload Shortcuts Micrsooft Software License Troubleshooting Organization Comparison Google Play Cyber security Smart Devices Social Network Flash Business Growth Remote Working Knowledge Data Analysis Telephone Systems Corporate Profile Screen Reader Recovery Telephony Trends Be Proactive Competition Employer Employee Relationship Mobile Technology AI Television Security Cameras Trend Micro Digital Security Cameras Electronic Health Records Customer Resource management Transportation Cabling Devices Entrepreneur Google Wallet G Suite Tip of the week LiFi Fileless Malware Wasting Time Banking Tablet eCommerce Documents Messenger VoIP Gamification Modem Workplace Strategies Application Deep Learning Tracking Company Culture Business Owner Mouse Videos Surveillance Telephone System Regulations Business Intelligence Hosted Solution Web Server Directions Managing Costs Business Metrics Backup and Disaster Recovery Securty Books Content SSID Digital Payment Desktop SharePoint Media Development Electronic Medical Records Employer/Employee Relationships Domains Language Worker Accountants Society Virtual Machine Access Database Optimization Reading Time Management Smart Technology Monitors Public Cloud Inbound Marketing Visible Light Communication Reviews 2FA Health IT Teamwork Equifax Windows 8 Hard Drive Disposal Data Storage Audit Hypervisor Spyware Tactics Relocation Username Medical IT Public Speaking Displays File Sharing Advertising Shopping Paperless Streaming Media Redundancy SQL Server Work/Life Balance Startup Electronic Payment Tech Support Freedom of Information Cache Addiction Keyboard email scam PCI DSS Navigation Licensing Humor Unified Threat Management Supply Chain Hard Drives Workers Mobile Security Gig Economy News Phone System Business Communications Internet Service Provider In Internet of Things User Tip Azure Legislation intranet Network Management Shortcut Network Congestion CCTV Regulations Compliance Printing Evernote Managed IT Service Wireless Hacks

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?