Employees Are Key To Cybersecurity

Cyber security training for employees could help nearly half the UK workforce to be more aware of threats as one in five say they could not identify a phishing email.

Staff awareness is not up to speed with the growing threat of cyber-attacks and 55% recall having had no training according to IT Governance. One in five employees are not sure they could identify a phishing email (a legitimate-looking email designed to extract information from the user). 

Those who had received training showed a much higher understanding of recognising and responding to cyber-attacks. As technology has developed and become more widely used across global organisations, phishing has become the favoured method of cyber criminals to gain information, such as account details and passwords. 

The Business Continuity Institute’s Cyber Resilience Report 2017 states that 57% of cyber security attacks were caused by phishing and social engineering, with 15% of organisations surveyed reporting more than ten cyber incidents in the past year.


With the EU General Data Protection Regulation (GDPR) drawing closer, organisations should be thinking about the security measures required to prevent the risk of a data breach and the potential damage that could follow. 

One of the key elements of achieving a privacy by design approach is adequate training to help employees recognise phishing and other cyber-attacks, which could prove harmful if not dealt with correctly.

Founder and executive chairman of IT Governance, Alan Calder, said: “Social engineering is a rapidly evolving threat. It is essential that professionals receive appropriate training to effectively deal with incidents and help organisations to avoid reputational damage from cyber-attacks.”

For Cyber Training please contact Cyber Security Intelligence for your company’s relevant options.

DigitalByDefault

You Might Also Read: 

Insiders Are Behind Most Business Cybersecurity Incidents:

Employees That Cause Data Breaches:
 

 

« Pentagon Considers Nuclear Retaliation To Big Cyber Attacks
Cyber Insurance: Good News & Bad News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Parasoft

Parasoft

Parasoft is an independent software testing and software quality assurance tool and solution vendor.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

itbox.online

itbox.online

Itbox.online offers IT solutions to ensure that your company's technologies are always available and secure as your business demands.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.