Why Your Organization Needs Security Awareness Training
Your employees are not able to stay ahead of modern cyber threats on their own. Any company, from large to small, is susceptible to being hacked and exploited. The damage is pretty much always severe.
IBM and Ponemon Institute are pleased to release the “2015 Cost of Data Breach Study: Global Analysis.” According to our research, the average total cost of a data breach for the participating companies increased 23 percent over the past two years to $3.79 million
The average cost paid for each lost or stolen record containing sensitive and confidential information increased 6 percent, jumping from $145 in 2014 to $154 in 2015. The lowest cost per lost or stolen record is in the transportation industry, at $121, and the public sector, at $68. On the other hand, the retail industry’s average cost increased dramatically, from $105 last year to $165.
Topics Covered in our Security Awareness Training
What Is Cybersecurity?
- Why is this something I should learn?
- What is my private data? What is PII? Why do people want this?
- Keeping your private info private (Confidentiality)
- Making sure your data can’t be changed (Integrity)
- Having access to your data even though it is secure (Accessibility)
What is Social Engineering?
- Human weaknesses and lack of knowledge is the main target of security threats
- Develop a healthy skepticism on the computer
- Knowing potential targets will help protect your information
- Scams and what to do when they happen
Emails and Links
- What is Phishing? How do I defend against it?
- What are Bad links and how do I identify them?
- Spoofed emails and examples
- Dive into case studies and examples
Basics of Online Security
- Never share secure information or PII over insecure channels
- Http vs. Https
- Check for website clones (spoofed url’s and websites)
- Browser security features
- Log out when you are done
- Risk Factors
- Social Media
- Online Banking
- Online Purchasing
- Any sites which request your information
- Keeping your public information private (Social Media)
- Almost Everything online is permanent
- Use good judgment in what to share online
- Physical Security
- Locking your devices up
- Securing USB devices, using encryption
- What is malware and what does it do
- What am I up against?
- Zombies & Botnets
- Script Kiddies
- Hacking tools
- Disable guest and account permissions
- Strong Password
- Virus Protection
- Regular Backups
- Home network security
- Home Wi-Fi Security
- Public Network Security
- Tablets and Phones are vulnerable
- Securing your data
- The dangers of rooting
- Scams (contact authorities, SSN Hold, Contact Bank, etc)
- Compromised Password / Hijacked account
- Infected Computer
Implement Enterprise End User Security Awareness Training Today
We’ve made it easy to create, implement, and track your End User Security Awareness training initiatives
Step 2: Invite your colleagues to join you on Cybrary
Step 3: Assign your Team a customized training agenda
Step 4: Report on your Team’s progress and success
- End User Security Awareness Training (1 hour deliver)
- Slides, notes, and additional extended lectures (no additional cost)
- Combined lecture, interaction, and quizzing
- Exportable reporting
- PCI/DSS Training available (no additional cost)
- HIPAA Training available (no additional cost)
- Optional: 0P3N and company sponsored posts on end user security and common social media exploits (no additional cost)