Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Pop away

Warning
titleDeprecated

The current Simulated Phishing campaign has ended, and signups are no longer being accepted. Examples of past Simulated Phishing campaigns are still provided below for reference.

...


In order to raise awareness of current phishing attack tactics, the Berkeley Lab Cyber Security team sends emails to Berkeley Lab employees that simulate real phishing attacks. If you would like to help improve Berkeley Lab's phishing awareness please sign up below.

The goal of this simulated phishing campaign is to help you to learn how to spot a phish and report it to the Cyber Security team. Accurately reporting phishing allows the Cyber Security team to alert other employees and block future phishes. 

Sign up

Simulated phishing emails will be sent only to users that have filled out this Link in New WindowlinkText Sign Up Formtiphttps://docs.google.com/a/lbl.gov/forms/d/1CyLC5yKCgwz9bvUOGLrC37zOJ0Vi0Y1EjnU01no5CCE/viewformhrefhttps://docs.google.com/a/lbl.gov/forms/d/1CyLC5yKCgwz9bvUOGLrC37zOJ0Vi0Y1EjnU01no5CCE/viewform.

What is Phishing?

An important part of this campaign is distinguishing between what is a phishing email, a targeted phishing email, and spam.

AttackDescriptionAction you should take
Targeted Phishing

A phishing attack that targets your affiliation with Berkeley Lab, UCB, or DOE to steal
sensitive data (passwords, SSNs, etc). These messages could appear to come from LBL email addresses or reference Lab employees.

Report immediately to [email protected]
PhishingAttacks that are carried out in order to steal passwords, SSNs, and other sensitive
data. These messages often ask you to click on a link, send information, or enter credentials by pretending to be a credible website (such as a bank).
Report to [email protected]
SpamThese are unwanted messages but are not asking for sensitive information.
Good to update spam filters by using our
Link in New Window
linkTextspam reporting procedures
tiphttps://commons.lbl.gov/display/itfaq/spam-report-procedure
hrefhttps://commons.lbl.gov/x/AQKMAw

...


How do I report a phishing email?

...

Information about individual responses will NOT be shared with anyone outside the security team. Passwords will NOT be stored.   This information will never be used or released in any identifiable manner outside the security group, including in any manner which would be used to evaluate your job performance. Simulated phishing is designed as a training exercise and to help the Laboratory understand our overall exposure to phishing as well as to target our protections and training.  It is in no way designed and will not be used to judge the performance of individuals.

Feedback 

In order to improve this program please fill out this form after receiving a simulated phishing email Link in New WindowlinkTextSimulated Phishing Feedback Formtiphttps://docs.google.com/a/lbl.gov/forms/d/1mOLv2WmepMK33BW2bHg--oc9kguK1I0_xOX8gDoC2kM/edit?ts=5772e843hrefhttps://docs.google.com/a/lbl.gov/forms/d/1mOLv2WmepMK33BW2bHg--oc9kguK1I0_xOX8gDoC2kM/edit?ts=5772e843

Past Simulated Phishing Campaigns

...