How should CIOs prepare teams for cyber threats?
April 16th, 2018
With new cyber threats appearing constantly, it’s important that a business keeps on top of these.
CIOs need to have a rolling training program to ensure that staff within a business are aware of all the major cyber threats which target the end-user. For example, social engineering, phishing, theft, data leakage, etc.
It’s important that classroom-based training occurs at induction or soon after. In the main, web-based online training systems do not deliver the same impact. Users often simply click next and have a pop at the answers in an online test. Classroom-based training is much harder hitting and typically raises awareness and increases retention of risks.
Post initial training, you should regularly update staff about changes to the threat landscape and to reinforce the basics. Online solutions are, typically, a good fit because training is quick and easy. Generally, some form of test post-training is sensible to assist with the retention of information.
It’s certainly beneficial to test staff without their knowledge. Let them know that this will happen periodically. Example tests will be things such as picking up data from a printer to look for sensitive material, call in from an external source pretending to be from IT asking for details to connect onto a desktop or compose a phishing type email.
Training and testing staff regularly goes a long way in ensuring the security of your business as many serious cyber threats target staff.
What is Microsoft Teams? | 7 benefits of Teams for businesses
What is Microsoft Teams? Microsoft Teams is a cloud-based chat and collaboration platform, designed to simplify and streamline communication between employees by offering one centralised place to connect. Instead of relying on clunky email chains, employees can send direct messages to co-workers, set up group chats or organise video, audio and web conferences, all without […]
Third party security breaches: How to ensure your data is safe on others’ systems
The reality of today’s cybersecurity landscape is that a company’s security extends to its third-party relationships. Whilst many businesses are still grappling with their own IT security, it is evident that they must also consider security strategies across the entire supply chain. Many companies, particularly those with tight regulatory bodies or running against standards such as […]
[INFOGRAPHIC] GDPR Quick Facts: What changes are in store
The official start of the EU’s General Data Protection Regulation (GDPR) is now just nine months away. This new regulation has been four years in the making and will standardise and strengthen data protection across the EU. It will also provide individuals with a greater say in how companies can use their data. Although Britain has […]