7 Essential Security Awareness Training Topics

7 Essential Security Awareness Training Topics

So your organisation has decided to implement a security awareness training strategy. Congratulations! Educating the people within your organisation about online threats is the single best thing that you can do (after implementing basic technical controls) to protect your digital infrastructure.

Whether you're developing your own internal training solution, or you've decided to go to market to purchase one that's ready made, I'd like to share with you my list of

7 Essential Security Awareness Training Topics

1. Email Security

Email is the primary method that attackers will use in order to target your organisation. They may do this via targeted phishing emails, malicious URLs or even email attachments containing malware. Learning to spot these emails and distinguish them from legitimate communication is an essential skill to have.

Other email related topics should include spear phishing and business email compromise attacks. Staff should be able to recognise and avoid clicking on malicious URLs, and understand the threat posed by malicious attachments.

You should educate staff about things such as email spoofing, and ensure that they are familiar with the difference between the CC and BCC email fields. More importantly, every security awareness training programme should promote the use of encrypted email.

2. Web Security

Cybercrime is rampant on the web today. There’s identity theft, organized fraud, malicious hacking and even political hacktivism. It’s now estimated that around 1 in 10 web pages contains some kind of malicious code. The primary motivation for these cyber criminals is financial – and financial crimes makes up a significant majority of threat landscape.

It's now an industry that’s estimated to be worth $113 billion US dollars. That’s enough money to host the London 2012 Olympics almost ten times over – or more than the global black market in marijuana, cocaine and heroin combined.

We need to keep our staff up to date with the latest web based attacks, and stress the importance of keeping software up to date. We must provide education and training around how to recognise malicious web pages, and spot websites which aren't using HTTPS to process personal data securely.

We need more education around password security, and the importance of two-factor authentication when it comes to securing our accounts. We also need to highlight awareness around common internet scams, and train users to be suspicious of unknown internet downloads.

It's also a great idea to include some information regarding online payments, to ensure that financial data is handled and processed correctly.

3. Mobile Security

We’re living in the information age of cloud-based platforms, where we require data on demand, and increasingly use mobile devices to enable our businesses. Field based teams use tablets, laptops and mobile phones to access the resources they need to do their jobs, and to stay in touch with their teams.

These devices store more sensitive information than ever, and in many cases utilise VPN connections back to our company head-quarters. The digital perimeter used to be within the physical confines of our premises, but today it extends across the globe.

Each mobile device represents a potential point of compromise, so it’s critical to our security that we take steps to secure these devices.

This includes training on mobile application security - including information about best app installation practices. It should also include information about public Wi-Fi hotspots, and the importance of VPN usage when using new or unknown networks.

Additionally, it's important to educate staff about PIN & passcode security, and the importance of encrypting the data on their devices. Make sure that you have a policy for lost & stolen devices, and communicate that out to your staff.

You may also want to include information that will help staff to detect and avoid newer SMS style phishing attacks (often referred to as smishing).

4. Data Protection

The majority of developed countries have data protection legislation, which govern the protection of personal information. This legislation often covers the collection and processing, transfer and security of personal data. In many cases the legislation also outlines the penalties for cases where data has been mishandled.

You may also have to comply with regulations and standards that govern your particular industry, for example medical practices in the United States have to maintain HIPPA compliance. These standards often include strict guidelines on handling personal information, and failure to comply can again result in heavy sanctions.

Providing adequate training to employees around data protection is critical. Employees all have a legal duty to protect and safeguard the information and data that they handle, particularly Sensitive PII.

Employees should be educated around topics such as data protection legislation, industry compliance obligations, personally identifiable information, secure data destruction, data classification and breach notification procedures.

5. Environmental Security

Environmental security concerns the systems and controls that we use to restrict access to sensitive information or resources. Environmental security controls include CCTV cameras, ID cards and access control systems.

Without physical security controls, our digital defences could be rendered completely useless. For example, if attackers had physical access to our servers they could install a key-logger to gather password information.

Security awareness training is essential to preventing physical security attacks such as tailgating and shoulder surfing. We should be educating employees about best security practices such as workstation locking, visitor policies and the importance of a clear desk.

6. Malware

Malware is one of the most serious threats to any organisation - particularly with the introduction of new ransomware style attacks. Malware has gone from becoming a nuisance to a legitimate threat to the confidentiality, integrity and availability of your data.

This is a particular problem when malware attacks are combined with other techniques such as phishing. Anti-spam filters are often unable to detect and prevent these emails from making it through, and anti-virus solutions are unable to detect the malware using signature-based matching.

Employees should be educated about malware and the risks that it poses. It's important that your security awareness programme includes information on what malware is, how exactly it behaves, how to recognise it and what to do if you become infected.

Your security awareness training can include information about common attack vectors such as ZIP files and macro-enabled Office documents. It's important to educate staff about the importance of backing up their files, particularly any email archives that they might have saved to their local disk.

7. Social Engineering

The single greatest threat to your security today is an attacker that’s skilled in manipulating human relationships. These attackers will attempt to gain the trust of somebody within your organisation in order to obtain information or access they otherwise wouldn’t have.

Scams such as business email compromise rely upon social engineering in order to be successful. Other social engineering pretexts may call unsuspecting employees and pose at the IT department. Social engineering is the #1 method that attackers will use to bypass your expensive firewall equipment.

To combat these threats our awareness training needs to educate employees about the nature of the risk and how it affects them. It's important that they understand a little bit about the psychology of influence (for example scarcity, reciprocity and urgency) so that they can better combat these attacks.

What do YOU think is important when it comes to security awareness training?

I’d love to hear YOUR comments below!


About The Author

Mike Carthy is an entrepreneur and cyber security specialist. He runs a successful business providing cyber security training to some of the world's largest companies, and dedicates his time to helping businesses to understand and tackle cyber threats. He's been featured in publications such as Laptop Magazine, The International Business Times and Computer Weekly.

Follow me on Twitter: @MichaelCarthy

Check out my blog: www.mikecarthy.com


Ivo B.

Global Head and Sr. Director of Security Governance, a strategy level role for Risk & Compliance, M&A , Supplier Security. Also experienced in IT management, IT (security) operations, architecture and auditing.

7 年

All big topics. Get the basics right: patch your systems timely, run malware/virus protection and do not run unsupported operations systems and applications, Stop saving money on hygene and...health will go up.

Marjorie Alvarez

Human Resource/ Administrative Assistant

8 年

This is a very nice take on a common problem in our industry. The lack of up-skill or reinforcement training has taken us back in recent years and are recently just beginning to use online resources to mitigate this. As an advocate for continuous self-learning and improvement, I asked my staff to enroll in online courses like those offered by Career Academy https://bit.ly/2hZxwU4 so that they can keep abreast with all the developments in our field. Following up on the resource provided here will surely help me reduce security breaches. With the help of our online training and the additional resources mentioned here, we hope to improve our training success. Thanks!

回复
Taanuj D

Corporate Communicator at M N M

8 年

Nice Informative Post on the other hand , The two-factor authentication is most widely used MFA model followed by three-factor authentication model, wherein smartcard with PIN and one time password (OTP) is the most popular technique. Get Free PDF brochure Download : https://www.marketsandmarkets.com/pdfdownload.asp?id=877

回复
Crystal Edmonds ~ CISA, PCI ISA

Sr. Manager - Information Security Audit at BCD Travel

8 年

Great article! I also believe the emphasis of blending how this impacts your employees personal lives along with professional is essential. Training associates to care for data as if it were their own is a reinforcement to protect data and systems not just when walking into an organizations doors but all aspects of their lives in the digital age.

回复
Chris Gebhardt

CISO. Practical. Reasonable. Creative. Concise. Experience with FedRAMP, CMMC, ISO, SOC, NIST, and many more. Former LE SWAT Team Leader.

8 年

Well said Mike. Short and sweet is the way to go and you certainly summed all the "low hanging fruit" into one article. I hope this get shared widely. Thanks for your contribution.

要查看或添加评论,请登录

Mike Carthy的更多文章

  • Polly: A Social Engineer's Dream

    Polly: A Social Engineer's Dream

    Here's one to watch: I've been playing around with Amazon's Polly recently and she's a dab hand at social engineering…

  • Is hacking back ever a good idea?

    Is hacking back ever a good idea?

    So the US government are in the process of drafting a piece of legislation which would - in theory, allow individuals…

    2 条评论
  • The New LinkedIn Update

    The New LinkedIn Update

    LinkedIn is refreshing its entire site today with a new look that’s designed to bring the aging social network firmly…

    1 条评论
  • 10 Things You Need To Know About The GDPR

    10 Things You Need To Know About The GDPR

    So GDPR is a hot topic right now in Europe and its no surprise that there’s a lot of confusion and mis-information…

    3 条评论
  • Yahoo Discloses 1 Billion User Accounts Hacked in Brand New Breach

    Yahoo Discloses 1 Billion User Accounts Hacked in Brand New Breach

    Yahoo has suffered another hack. The company disclosed today that it has discovered a breach of more than one billion…

    3 条评论
  • The 10 Most Damaging Security Breaches of 2016

    The 10 Most Damaging Security Breaches of 2016

    There’s no doubt that 2016 has been a massive year for data breaches. We’ve seen breaches affecting large retailers…

    1 条评论
  • Humans: The Weakest Link In Information Security

    Humans: The Weakest Link In Information Security

    There is a common thread that connects the recent Ubiquity Networks hack, the breach that cost them $47 million dollars…

    5 条评论
  • The Ultimate Security Awareness Course - Join The Waiting List

    The Ultimate Security Awareness Course - Join The Waiting List

    Hi LinkedIn, I wanted to write this post today to share details of a super-secret project that I've been working on for…

    4 条评论
  • No Caller ID? How To Unmask Blocked / Unknown Calls

    No Caller ID? How To Unmask Blocked / Unknown Calls

    Have you ever received a call from an unknown number? It's a situation that we've all faced at one time or another. The…

    15 条评论
  • 10 Proven Ways To Harden Your Security Defences

    10 Proven Ways To Harden Your Security Defences

    As security professionals we’re constantly striving to achieve a better security posture for our organisations. Since…

    2 条评论

社区洞察

其他会员也浏览了