How to Phish Your Employees
Cybercrime has gone pro. Cybercriminals are bypassing your firewall, endpoint protection and other technology-based security measures by going after your users.
Since your users are your last line of defense, you need to equip them with the know-how to defend against phishing attacks; the most common way bad actors break in. So let’s phish our own employees and then work out how to get them through effective security awareness training. But it has to be more than once per year, because anything that goes too long without practice will soon be forgotten. We need something that keeps users on their toes year-round.
But first, how are we going to phish our employees? We need to know the Phish-prone™ Percentage of our end-users. You can use this free phishing test to learn the current state of you organization.
Ways to Phish Your Employees
Raise a temporary webserver, and “roll your own” phishing site.
Create your own phishing email that should lure the users to your fake site, using what you know about social engineering. Work out how the tracking and reporting works, and code that. Make it look acceptable. Takes a few days of work for someone who knows what they are doing. Next, send the email to all users using a mail server that allows you to spoof the “From” address. Then respond to users calling and emailing about this. Fend off your manager who is getting calls from other managers about this, despite the fact this was all announced well in advance. All this on top of a normal 60 hours per week workload.
Get an outside security consultant.
They will come in and do all the above as a “mini PEN test.” It is 40 hours at $250 an hour. You may not have an extra $10,000 in the budget and will never get that approved. And that’s a one-time test.
Use Semi-automated tools.
There are the people that have most of this automated that could save some time, and they compete with each other. Ask several for a quote, it might be more than you expect. And there is still a lot of manual work here.
Use a phishing simulation platform.
There are several platforms that can set this up for your organization. It is the fastest and most cost effective way to start improving your security culture. You should choose the best phishing simulation platform for your organization's needs.
The Right Way to Phish Employees
What you want to test and train on is just one click away. Today, users need to be inoculated against social engineering. Forget about the need for creating a fake phishing website.
Steps to implementing a program
- Do a simulated phishing attack and get a baseline percentage of which users are Phish-prone™. You could skip this step if company politics get in the way. But what you absolutely have to do is –
- Train them online about various vectors of social engineering for about 30 to 40 minutes,
- Send them simulated phishing attacks at least once a month.
An additional five points to consider
- Awareness in and of itself is only one piece of defense-in-depth, but crucial
- You can't and shouldn't do this alone
- You can't and shouldn't train on everything
- People only care about things that they feel are relevant to them
- The ongoing process is to help employees make smarter security decisions
The five best practices to embrace
- Have explicit goals before starting
- Get the executive team involved
- Decide what behaviors you want to shape - choose two or three and work on those for 12-18 months
- Treat your program like a marketing effort
- Phish frequently, once a month minimum
Once users understand that they will get tested on a regular basis, and that there are repercussions for repeated failures, their behavior changes, and with each email they will take a second or two and “stop, look, think” if this might be a scam email. This is the ONLY effective way to train employees against social engineering. We see a dramatic drop in Phish-prone™ Percentages with our customers, seen clearly in their KnowBe4 platform. Our integrated phishing tool, PhishER Plus, is just one part of our comprehensive solution. KnowBe4 has these three steps fully automated, gives you a management console and the whole thing takes 15 minutes, set-it-and-forget-it, whether you have 50, 500 or 50,000 users.
Phishing Simulation Test - Frequently Asked Questions
Why should I run a phishing test on my employees?
You should run a phishing test on your employees because cybercriminals are increasingly bypassing firewalls, endpoint protection, and other technical defenses by targeting users directly through social engineering. In practice, your employees act as your organization's very last line of defense.
Phishing simulations allow you to establish a critical baseline of vulnerability, known as your Phish-prone™ Percentage. Testing employees regularly keeps them on their toes year-round, inoculates them against common threat tactics, and transforms them into an active security layer. Without consistent practice and testing, your employees will quickly forget their training and become highly susceptible to real-world attacks.
How do I test my employees for phishing?
The most effective way to test your employees for phishing is by utilizing a fully automated, continuous security awareness training platform rather than trying to build a fake site manually.
First, conduct a preliminary baseline simulated phishing attack to determine what percentage of your users are currently vulnerable. Next, provide them with 30 to 40 minutes of online training covering various vectors of social engineering. Finally, commit to sending simulated phishing attacks continuously. For example, comprehensive platforms like KnowBe4 allow you to manage this three-step process easily through an automated console, turning what could be days of tedious manual work into a simple 15-minute, set-it-and-forget-it setup.
How often should I send simulated phishing tests?
You should send simulated phishing tests to your employees at least once a month. The KnowBe4 article emphasizes that testing any less frequently is ineffective because security principles that go too long without practice will soon be forgotten.
Consistent, frequent testing keeps your users actively aware and on their toes year-round. Once employees realize they will be tested on a regular basis, their overall behavior changes. Routine simulations encourage them to naturally take a second or two to "stop, look, and think" before interacting with links or attachments in suspicious emails.
Can I create my own employee phishing test manually?
While you can absolutely create your own employee phishing test manually, it is highly discouraged due to the massive time commitment and complexity required.
To successfully "roll your own" simulation, you would have to raise a temporary web server, properly code a fake phishing site, draft a convincing social engineering email, configure the tracking and reporting metrics, and manage spoofing safely on your mail server. In practice, this takes days of dedicated work. Furthermore, you will have to manually fend off calls and emails from confused managers and users. For most IT administrators navigating a 60-hour work week, a manual phishing test is not a realistic option.
What is the best way to train employees on phishing?
The best way to train employees on phishing is through a continuous, three-step process that deeply integrates testing and education to drive behavioral change.
The ideal strategy begins with sending a baseline simulated phishing attack to easily see who is initially vulnerable. Following that, employees should complete 30 to 40 minutes of targeted online training to help them thoroughly recognize different social engineering vectors. Keep in mind that you cannot and should not attempt to train them on everything all at once; focus intensely on making the material feel relevant to their daily workflows. Finally, reinforce this training by sending out new simulated phishing emails at least once a month.
What behaviors should a phishing simulation program target?
When running a robust phishing simulation program, you should purposely explicitly decide which behaviors you want to shape, rather than trying to train on everything all at once.
The best practice is to deliberately choose two or three specific security behaviors to focus on. For example, you might orient your program entirely around helping employees identify external sender warnings and pausing to verify urgent wire transfer requests. The article recommends working intensely on simply those few selected behaviors over a dedicated 12 to 18-month period. Having these explicit goals ensures that your employees aren't overwhelmed by generalized information.
Who needs to be involved in an employee phishing program?
An effective employee phishing program fundamentally requires broad organizational buy-in; as an IT leader, you cannot and should not attempt to execute it alone.
Most importantly, you need to get the executive team actively involved to ensure strong leadership support, organizational alignment, and appropriate resources. Furthermore, the KnowBe4 guide directly suggests treating your security awareness program much like a standard marketing campaign to keep employees engaged and continuously aware. Actively having your leadership team on board helps align the internal messaging and firmly reinforces the critical idea that security is a company-wide priority.
What happens after an employee fails a phishing test?
When an employee routinely fails a phishing test, that failure should automatically trigger additional learning opportunities within your ongoing continuous training curriculum.
The ultimate strategic goal is to actively help your employees make smarter security decisions down the road. Once users genuinely understand that they will be tested on a regular basis—at least once a month—and that there are structured repercussions for repeated failures, their behavior naturally begins to change. With structured frequent testing, employees learn to routinely pause and take a second or two to "stop, look, think" before clicking on any suspicious email links.
What is a Phish-prone Percentage?
A Phish-prone™ Percentage is a foundational metric measuring exactly what percentage of your end-users are currently highly vulnerable to targeted social engineering attacks before receiving comprehensive training.
By effectively sending an initial "baseline" simulated phishing attack without warning, you can clearly measure how many of your employees take the bait. Establishing this specific baseline is typically the very first step in establishing an actionable security program. Actively understanding your Phish-prone Percentage uniquely allows you to map explicit training goals, and importantly, it provides you with a tangible benchmark to track over time.
See KnowBe4 Security Awareness Training in Action
See how you can efficiently safeguard your organization from sophisticated social engineering threats.