<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>phishing Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/phishing/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/phishing</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Sat, 13 Jan 2024 12:25:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>phishing Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/phishing</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Ethical considerations in phishing tests: to inform employees or not?</title>
		<link>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests</link>
					<comments>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 13 Jan 2024 12:25:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[ethics]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing simulations]]></category>
		<category><![CDATA[security awareness]]></category>
		<category><![CDATA[security culture]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1305</guid>

					<description><![CDATA[<p>TL;DR This article delves into the ethical considerations in phishing tests, highlighting the balance needed between conducting realistic simulations and maintaining fairness in cybersecurity training. This article explores the complexities of conducting phishing simulations in the workplace. Key takeaways include the importance of transparency in fostering a positive security culture, building trust through clear communication, [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests">Ethical considerations in phishing tests: to inform employees or not?</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/ethical-considerations-in-phishing-tests/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 15 Jul 2021 19:10:52 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[deliverability]]></category>
		<category><![CDATA[dkim]]></category>
		<category><![CDATA[dmarc]]></category>
		<category><![CDATA[email marketing]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[spf]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=529</guid>

					<description><![CDATA[<p>My key takeaways DMARC uses SPF and/or DKIM In 2021 the National Defense Authorization Act says the Department of Homeland Security (DHS) must implement DMARC US wide there exists an RFC for &#34;email from&#34; SPF = receiving email server checks MAIL FROM address or the domain’s IP address in the HELO handshake against the sender’s [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox">Webinar takeaway: Implement DMARC the Right Way to Keep Phishing Attacks Out of Your Inbox</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-implement-dmarc-the-right-way-to-keep-phishing-attacks-out-of-your-inbox/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Roger Grimes Teaches You Phishing Mitigation</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 12 May 2021 19:00:36 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=453</guid>

					<description><![CDATA[<p>My key takeaways ~40 threats/day in 2020 to take care of top 3 initial breach root causes social engineering unpatched software (&#62;90% Java) medium threat general mitigations policies tech. defenses security awareness training Also educate your vendors about your AUP include a phishing mitigation section in your AUP paying everybody $1000/year who doesn&#8217;t fall for [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation">Webinar Takeaway: Roger Grimes Teaches You Phishing Mitigation</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-roger-grimes-teaches-you-phishing-mitigation/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Why a Security Awareness Program Isn&#8217;t Enough to Secure Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 18:25:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=437</guid>

					<description><![CDATA[<p>My key takeaways Humans are the de-facto top choice for cybercriminals seeking to gain access into an organization. Security Awareness &#38; frequent simulated social engineering testing is a proven method to reduce your organization’s phish prone percentage. The ideal situation for a cyber criminal or social engineer is to hijack the OODA loop by creating [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network">Webinar Takeaway: Why a Security Awareness Program Isn&#8217;t Enough to Secure Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 01 Apr 2021 18:17:02 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[automation]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=382</guid>

					<description><![CDATA[<p>My key takeaways Automation tools like Ansilble, terraform and docker can also create a evil environment eg for phishing Don&#8217;t put sensible tokens or passwords in ainsible config files but use a cloud password manager and pull the pass as variable into ainsible Best of phishing themes: give away 2 iPhones or check a link [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps">Webinar Takeaway: How to Build a Phishing Engagement &#8211; Coding TTP´s</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-how-to-build-a-phishing-engagement-coding-ttps/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WEBINAR TAKEAWAY: When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 20:40:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=289</guid>

					<description><![CDATA[<p>MY KEY TAKEAWAYS already 20 years ago, Kevin Mitnick testified before US Senate and highlighted social engineering and the need for training. Still today changing human behaviour is most times the weakest point. threat actors have almost unlimited time to do extensive research before an attack, so they are extremly good at buidling the trust [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust">WEBINAR TAKEAWAY: When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
