Employees Are Key To Cybersecurity

Cyber security training for employees could help nearly half the UK workforce to be more aware of threats as one in five say they could not identify a phishing email.

Staff awareness is not up to speed with the growing threat of cyber-attacks and 55% recall having had no training according to IT Governance. One in five employees are not sure they could identify a phishing email (a legitimate-looking email designed to extract information from the user). 

Those who had received training showed a much higher understanding of recognising and responding to cyber-attacks. As technology has developed and become more widely used across global organisations, phishing has become the favoured method of cyber criminals to gain information, such as account details and passwords. 

The Business Continuity Institute’s Cyber Resilience Report 2017 states that 57% of cyber security attacks were caused by phishing and social engineering, with 15% of organisations surveyed reporting more than ten cyber incidents in the past year.


With the EU General Data Protection Regulation (GDPR) drawing closer, organisations should be thinking about the security measures required to prevent the risk of a data breach and the potential damage that could follow. 

One of the key elements of achieving a privacy by design approach is adequate training to help employees recognise phishing and other cyber-attacks, which could prove harmful if not dealt with correctly.

Founder and executive chairman of IT Governance, Alan Calder, said: “Social engineering is a rapidly evolving threat. It is essential that professionals receive appropriate training to effectively deal with incidents and help organisations to avoid reputational damage from cyber-attacks.”

For Cyber Training please contact Cyber Security Intelligence for your company’s relevant options.

DigitalByDefault

You Might Also Read: 

Insiders Are Behind Most Business Cybersecurity Incidents:

Employees That Cause Data Breaches:
 

 

« Pentagon Considers Nuclear Retaliation To Big Cyber Attacks
Cyber Insurance: Good News & Bad News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

CodeSealer

CodeSealer

CodeSealer provide invisible end-to-end user interface protection with a unique web security solution to eliminate Man-in-the-Middle and Man-in-the-Browser vulnerabilties.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Kirk ISS

Kirk ISS

Kirk ISS are the leading provider of IT services in the Cayman Islands. We offer best-in class hardware, software, communications and cloud computing, all backed by professional services support.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Cranium

Cranium

Cranium are an international consultancy organisation specialised in privacy, security and data management.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

National Critical Information Infrastructure Protection Centre (NCIIPC) - India

NCIIPC's mission is to protect the Critical Information Infrastructure of India, from unauthorized access, modification, use, disclosure, disruption, incapacitation or destruction.