IT Governance Cyber Security Phishing Awareness Course

emailexposure.png

IT Governance, a cyber security services provider, has launched a Cyber security and phishing staff awareness e-learning course to help businesses raise awareness among employees about the dangers of phishing-based cyber attacks.

Cyber criminals are well aware of the advantages that clever phishing tactics can offer. By tricking the uninformed using a variety of manipulative tactics, criminals can quickly gain access to an organisation’s systems and networks, install malware, steal personal information or even bring the company to its knees. 

Panda Security research shows that 30% of all of the malware that has ever existed was created in 2013. That is the equivalent of 30 million new malware threats in one year, or about 82,000 per day. In 2014, that figure has doubled to 160,000 new samples every day. 

Alan Calder, founder and executive chairman of IT Governance, explains: “Employees often don’t understand the dangers of clicking on malicious links or providing their details online. Hackers can exploit this obvious vulnerability and cause a lot of damage. This course has been carefully designed to explain the multitude of phishing tactics employed by criminals to deceive and defraud individuals and organisations, thereby empowering users to recognise these tricks and avoid exposing your organisation to risks.”

The Cyber security and phishing staff awareness course has been designed to illustrate concepts in simple terms and is packed with practical examples, interactive graphics and images. The course reveals the different tactics commonly employed in phishing campaigns without unnecessary technical jargon. Including useful tips and advice, the course teaches users to screen attachments and links, verify URLs, watch out for unsolicited requests, and to be mindful of scams when using social media or receiving an email.

The course can be combined with a simulated phishing campaign in order to gauge the level of employee awareness before and after taking the course.

Calder says, “Mounting evidence points to the fact that employees are the biggest security threat facing the average organisation. It is only by educating and enlightening employees to the risks of cyber threats such as phishing attacks that we will be able to beat this problem.”

Ein News http://bit.ly/1G04uMn

 

« Threat Lessons from Sony and Anthem
Talk of Cyber Attack as Huge Power Outages Hit Turkey »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.