IT Governance Cyber Security Phishing Awareness Course

emailexposure.png

IT Governance, a cyber security services provider, has launched a Cyber security and phishing staff awareness e-learning course to help businesses raise awareness among employees about the dangers of phishing-based cyber attacks.

Cyber criminals are well aware of the advantages that clever phishing tactics can offer. By tricking the uninformed using a variety of manipulative tactics, criminals can quickly gain access to an organisation’s systems and networks, install malware, steal personal information or even bring the company to its knees. 

Panda Security research shows that 30% of all of the malware that has ever existed was created in 2013. That is the equivalent of 30 million new malware threats in one year, or about 82,000 per day. In 2014, that figure has doubled to 160,000 new samples every day. 

Alan Calder, founder and executive chairman of IT Governance, explains: “Employees often don’t understand the dangers of clicking on malicious links or providing their details online. Hackers can exploit this obvious vulnerability and cause a lot of damage. This course has been carefully designed to explain the multitude of phishing tactics employed by criminals to deceive and defraud individuals and organisations, thereby empowering users to recognise these tricks and avoid exposing your organisation to risks.”

The Cyber security and phishing staff awareness course has been designed to illustrate concepts in simple terms and is packed with practical examples, interactive graphics and images. The course reveals the different tactics commonly employed in phishing campaigns without unnecessary technical jargon. Including useful tips and advice, the course teaches users to screen attachments and links, verify URLs, watch out for unsolicited requests, and to be mindful of scams when using social media or receiving an email.

The course can be combined with a simulated phishing campaign in order to gauge the level of employee awareness before and after taking the course.

Calder says, “Mounting evidence points to the fact that employees are the biggest security threat facing the average organisation. It is only by educating and enlightening employees to the risks of cyber threats such as phishing attacks that we will be able to beat this problem.”

Ein News http://bit.ly/1G04uMn

 

« Threat Lessons from Sony and Anthem
Talk of Cyber Attack as Huge Power Outages Hit Turkey »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

Hallam-ICS

Hallam-ICS

Hallam-ICS designs MEP systems for facilities and plants, control and automation solutions, and ensures safety and regulatory compliance.

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node

NSW Cyber Security Innovation Node is part of a national network designed to foster and accelerate cyber capability and innovation across Australia.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

Cyber Smart Defense

Cyber Smart Defense

Cyber Smart Defense is a specialist provider of penetration testing services and IT security audits.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

Coffee Cup Solutions

Coffee Cup Solutions

We offer a full spectrum of IT Services, from our UK based Helpdesk to IT Consultancy and Cyber Security. Our team has the skills and experience to develop, deliver and manage IT for your business.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Mindcore Technologies

Mindcore Technologies

Mindcore provide cyber security services, managed IT services and IT consulting services to businesses in NJ, FL, and throughout the United States.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.