What's the Deal with Callback Phishing?
Callback phishing isn't your typical email scam. Instead of the usual suspects with bad grammar and obvious malicious links, these attacks play mind games. They set up a multi-layered trap using some smooth-talking tactics to get you to dial a fake number and spill your sensitive info.
How Do These Sneaky Attacks Actually Work?
Picture this: you get an email that seems harmless, maybe about a subscription or an invoice. But hidden inside is a phone number. You think it's legit, so you call. Surprise, surprise! You're talking to a sneaky cyber villain who knows how to sweet-talk you. They might trick you into revealing your personal info or even let them into your network. Yikes!
Simulated Callback Phishing Campaigns: What's the Drill?
Now, imagine if you could put your users' street smarts to the test. As an admin, you can use the new Callback Phishing feature in your KnowBe4 console and run a simulated callback phishing campaign to see if your employees would fall for this social engineering trick. An email lands in their inbox, with a phone number and a code. If they dial that number, they’ll be asked for the code. But here's the catch—enter the code, that’s the first failure point, give up personal or sensitive info, that’s a double whammy.
What's included with KnowBe4’s Callback Phishing feature?
Here's what you get:
Ready to give it a try? Boost your organization’s security awareness with Callback Phishing!
For more information on how to create callback phishing campaigns in your KnowBe4 console, check out the Knowledgebase article: https://support.knowbe4.com/hc/en-us/articles/18223402626323-How-to-Create-and-Manage-Callback-Phishing-Campaigns
Callback Phishing is available to KnowBe4 customers with a Diamond-level subscription.