All Employees Need This Effective New Training Tool

Featured Editorial
 
With the Covid-19 global pandemic forcing millions of office workers to become remote workers this has created a “perfect tsunami” for cyber criminals seeking to exploit the crisis and penetrate corporate defences via unsecured home networks. Businesses investing heavily in cyber security often base their investments on technology, but don’t sufficiently attend to the human side of the problem, which is a very important issue and requires cyber security training and engagement for all employees.
 
What has become very apparent in the last few years is that all employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.  
 
What has also become clear is that effective employee cyber training will reduce security costs, improve an organisations future commercial strategy, and will help to protect it against cyber-attacks, hacking, fake news and negative brand PR security. 
 
The reasons why employees are so important for the operations security is because often cyber criminals will perform attacks on an organisation using phishing emails and similar tactics, making employees the first line of defense that needs to be strengthened.
 
Employees are also the ones with everyday access to many of the organisation’s computers, networks and systems, which means they play an important part in building resilience in the threat landscape. Recent analysis by Cyber Security Intelligence has shown that over half of most organisations employees have not received effective cyber security training, so it’s no surprise for instance that 96% of them still save passwords on their devices so they can ‘remember them’.
 
HR professionals are uniquely positioned to understand the role of trained employees in cyber risk mitigation and to mediate solutions for an organisation’s cyber security challenges. However, they often do not have expertise in cyber security training and they may lack the understanding of all general employee expertise in cyber defense. 
 
Each aspect of the organisation knows part of the solution but understandably none know the whole solution and often the result is disjointed and dysfunctional education and training.
 
Cyber Attacks & Fraud
Currently cyber criminals are after identity resources such as social security numbers, credit card information and login credentials. These can be used to impersonate or steal directly from the organisation and cyber-attacks are being used to steal, monitor and influence most organisations via their management and employees.  
  • Cyber-attacks have cost US businesses over $650 billion in 2019 and UK businesses have lost almost $40 billion in the past 12 months due to cyber security attacks, hacks and related security incidents.
  • The insurance industry has that found 55% of business had faced an attack in 2019 which is an increase from 40% in 2018.
  • Currently almost 75% of firms are ranked as mere 'early starters' in terms of cyber readiness. 
  • Currently Londoners are losing an average of £26 million a month in cyberattacks on businesses and individuals according to police sources. 
Most Directors and Boards are often ignorant to the dangers of hackers as they rely and trust in their IT Department’s ability to keep their organisations safe. To stay safe within their organisation's protocols IT managers sometimes hide the system's weaknesses and are under pressure to reduce costs. 
 
Training is also an issue for the whole organisation and employee education is the best way to tackle these types of threats. 
Only around 27% of organisations have trained their employees in the last 12 months. This should be done on a more frequent basis and doesn’t take up much time but keeps them on the cyber moment as the technology and the methods of attack change and become more sophisticated.
 
Cyber Security Training for All Employees
Nevertheless, we have found cyber security training experience for employees that works. 
GoCyber is a new, innovative cyber security training app created out of a unique partnership with Me Learning, an established provider of digital training to the UK local government and the MOD, and Lumen Consulting Group, a tech provider from Silicon Valley who uses its training app to develop employee engagement programmes for international enterprises, including Gap and Nike.
 
Collectively they have drawn on their individual expertise to develop a unique and new, ‘learn by doing’ approach to cyber security training. 
 
One of the major issues that has become apparent and is not focused upon enough is the need for real time cyber training. 
Cyber security training needs to take place within all organisations in order to significantly reduce the chances and risks of criminal success that are using cyber-attacks and hacking methods to steal your data, money, company secrets and login information. 
 
  • Cyber security training needs to be more than a mere annual necessity. It needs to be an interactive and engaging experience that will solidify their role in the security posture of the organization. 
  • GoCyber integrates learning into the flow of work - and asks users to commit to 10 minutes a day for 10 days at a time that suits them. Its’ action based approach combines thought-provoking material with social learning, gamification and achievable actions. Users learn by doing. 
Collectively organisations see an immediate impact on the way employees approach their own, and their company’s online safety. Learning is re-enforced by a monthly step. Leading cyber experts have contributed to the content. 
 
This is a very effective and engaging new cyber training app that has been created by GoCyber for all employees from part time to senior executives and it has been tested by some prominent organisations. We at Cyber Security Intelligence recommend its use to all organisations.
 
For a free trial please contact Cyber Security Intelligence or visit GoCyber
 
 
 
« Internet Cable To Encircle Africa
The Influence Of AI On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Silverfort

Silverfort

Silverfort introduces the first security platform enabling adaptive authentication and identity theft prevention for sensitive user, device and resource throughout the entire organization.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Very Good Security (VGS)

Very Good Security (VGS)

VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Cyber Protection Group (CPG)

Cyber Protection Group (CPG)

Cyber protection Group specialize in Penetration Testing. We work with enterprise level companies as well as small to medium sized businesses.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Verizon

Verizon

Verizon is a leader in IT technology solutions - Verizon Cloud, Networking, Security, Mobility, Machine-to-Machine (M2M), Advanced Communications and Professional Services.

Cygna Labs

Cygna Labs

Cygna Labs is a software developer and one of the top three global DDI (DNS, DHCP, and IP address management) vendors.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.