Blog
How should CIOs prepare teams for cyber threats?
April 16th, 2018
With new cyber threats appearing constantly, it’s important that a business keeps on top of these.
CIOs need to have a rolling training program to ensure that staff within a business are aware of all the major cyber threats which target the end-user. For example, social engineering, phishing, theft, data leakage, etc.
It’s important that classroom-based training occurs at induction or soon after. In the main, web-based online training systems do not deliver the same impact. Users often simply click next and have a pop at the answers in an online test. Classroom-based training is much harder hitting and typically raises awareness and increases retention of risks.
Post initial training, you should regularly update staff about changes to the threat landscape and to reinforce the basics. Online solutions are, typically, a good fit because training is quick and easy. Generally, some form of test post-training is sensible to assist with the retention of information.
It’s certainly beneficial to test staff without their knowledge. Let them know that this will happen periodically. Example tests will be things such as picking up data from a printer to look for sensitive material, call in from an external source pretending to be from IT asking for details to connect onto a desktop or compose a phishing type email.
Training and testing staff regularly goes a long way in ensuring the security of your business as many serious cyber threats target staff.
Direct routing turns Teams into a full unified communications solution
Many Telecom providers have now launched direct routing for Microsoft Teams, allowing users to make and receive calls external to their organisation through the platform. Users can now use the normal Teams application whilst remote or on the move without the need for third-party softphones. Microsoft recorded a huge spike in active Teams users since the lockdown was announced, as businesses look for […]
Why are passwords insecure?
Too many organisations are still just relying on passwords to allow remote workers, partners and clients to access their business systems. This generally presents an unacceptable level of risk to a business, passwords on their own are not secure. How can passwords be breached? Given to or stolen by another employee Eliminating traceability of actions on […]
The realities of remote working
Remote working has been around since communications have been available to the roaming and remote worker, in general terms. It’s been pushed and pulled by small, medium and large-sized enterprises. It’s been claimed as the future of working and also criticised as the destroyer of efficiency and culture. But there’s one important question that has […]