Employees Are Key To Cybersecurity

Cyber security training for employees could help nearly half the UK workforce to be more aware of threats as one in five say they could not identify a phishing email.

Staff awareness is not up to speed with the growing threat of cyber-attacks and 55% recall having had no training according to IT Governance. One in five employees are not sure they could identify a phishing email (a legitimate-looking email designed to extract information from the user). 

Those who had received training showed a much higher understanding of recognising and responding to cyber-attacks. As technology has developed and become more widely used across global organisations, phishing has become the favoured method of cyber criminals to gain information, such as account details and passwords. 

The Business Continuity Institute’s Cyber Resilience Report 2017 states that 57% of cyber security attacks were caused by phishing and social engineering, with 15% of organisations surveyed reporting more than ten cyber incidents in the past year.


With the EU General Data Protection Regulation (GDPR) drawing closer, organisations should be thinking about the security measures required to prevent the risk of a data breach and the potential damage that could follow. 

One of the key elements of achieving a privacy by design approach is adequate training to help employees recognise phishing and other cyber-attacks, which could prove harmful if not dealt with correctly.

Founder and executive chairman of IT Governance, Alan Calder, said: “Social engineering is a rapidly evolving threat. It is essential that professionals receive appropriate training to effectively deal with incidents and help organisations to avoid reputational damage from cyber-attacks.”

For Cyber Training please contact Cyber Security Intelligence for your company’s relevant options.

DigitalByDefault

You Might Also Read: 

Insiders Are Behind Most Business Cybersecurity Incidents:

Employees That Cause Data Breaches:
 

 

« Pentagon Considers Nuclear Retaliation To Big Cyber Attacks
Cyber Insurance: Good News & Bad News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

HackControl

HackControl

HackControl services include penetration tests, security audits, block chain audits and brand and anti-phishing protection.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Silk Security

Silk Security

Silk is the first platform that enables enterprises to take a strategic, sustainable approach to resolving code, infrastructure and application risk.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.

National Renewable Energy Laboratory (NREL)

National Renewable Energy Laboratory (NREL)

NREL is transforming energy through research, development, commercialization, and deployment of renewable energy and energy efficiency technologies.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.