7 Essential Security Awareness Training Topics
Mike Carthy
Cyber security recruitment is broken. Resumes lie. Recruiters don’t vet skills. Interviews are a gamble. Cut through the bullsh*t with real-world cyber challenges before you hire. Start your free trial now ??
So your organisation has decided to implement a security awareness training strategy. Congratulations! Educating the people within your organisation about online threats is the single best thing that you can do (after implementing basic technical controls) to protect your digital infrastructure.
Whether you're developing your own internal training solution, or you've decided to go to market to purchase one that's ready made, I'd like to share with you my list of
7 Essential Security Awareness Training Topics
1. Email Security
Email is the primary method that attackers will use in order to target your organisation. They may do this via targeted phishing emails, malicious URLs or even email attachments containing malware. Learning to spot these emails and distinguish them from legitimate communication is an essential skill to have.
Other email related topics should include spear phishing and business email compromise attacks. Staff should be able to recognise and avoid clicking on malicious URLs, and understand the threat posed by malicious attachments.
You should educate staff about things such as email spoofing, and ensure that they are familiar with the difference between the CC and BCC email fields. More importantly, every security awareness training programme should promote the use of encrypted email.
2. Web Security
Cybercrime is rampant on the web today. There’s identity theft, organized fraud, malicious hacking and even political hacktivism. It’s now estimated that around 1 in 10 web pages contains some kind of malicious code. The primary motivation for these cyber criminals is financial – and financial crimes makes up a significant majority of threat landscape.
It's now an industry that’s estimated to be worth $113 billion US dollars. That’s enough money to host the London 2012 Olympics almost ten times over – or more than the global black market in marijuana, cocaine and heroin combined.
We need to keep our staff up to date with the latest web based attacks, and stress the importance of keeping software up to date. We must provide education and training around how to recognise malicious web pages, and spot websites which aren't using HTTPS to process personal data securely.
We need more education around password security, and the importance of two-factor authentication when it comes to securing our accounts. We also need to highlight awareness around common internet scams, and train users to be suspicious of unknown internet downloads.
It's also a great idea to include some information regarding online payments, to ensure that financial data is handled and processed correctly.
3. Mobile Security
We’re living in the information age of cloud-based platforms, where we require data on demand, and increasingly use mobile devices to enable our businesses. Field based teams use tablets, laptops and mobile phones to access the resources they need to do their jobs, and to stay in touch with their teams.
These devices store more sensitive information than ever, and in many cases utilise VPN connections back to our company head-quarters. The digital perimeter used to be within the physical confines of our premises, but today it extends across the globe.
Each mobile device represents a potential point of compromise, so it’s critical to our security that we take steps to secure these devices.
This includes training on mobile application security - including information about best app installation practices. It should also include information about public Wi-Fi hotspots, and the importance of VPN usage when using new or unknown networks.
Additionally, it's important to educate staff about PIN & passcode security, and the importance of encrypting the data on their devices. Make sure that you have a policy for lost & stolen devices, and communicate that out to your staff.
You may also want to include information that will help staff to detect and avoid newer SMS style phishing attacks (often referred to as smishing).
4. Data Protection
The majority of developed countries have data protection legislation, which govern the protection of personal information. This legislation often covers the collection and processing, transfer and security of personal data. In many cases the legislation also outlines the penalties for cases where data has been mishandled.
You may also have to comply with regulations and standards that govern your particular industry, for example medical practices in the United States have to maintain HIPPA compliance. These standards often include strict guidelines on handling personal information, and failure to comply can again result in heavy sanctions.
Providing adequate training to employees around data protection is critical. Employees all have a legal duty to protect and safeguard the information and data that they handle, particularly Sensitive PII.
Employees should be educated around topics such as data protection legislation, industry compliance obligations, personally identifiable information, secure data destruction, data classification and breach notification procedures.
5. Environmental Security
Environmental security concerns the systems and controls that we use to restrict access to sensitive information or resources. Environmental security controls include CCTV cameras, ID cards and access control systems.
Without physical security controls, our digital defences could be rendered completely useless. For example, if attackers had physical access to our servers they could install a key-logger to gather password information.
Security awareness training is essential to preventing physical security attacks such as tailgating and shoulder surfing. We should be educating employees about best security practices such as workstation locking, visitor policies and the importance of a clear desk.
6. Malware
Malware is one of the most serious threats to any organisation - particularly with the introduction of new ransomware style attacks. Malware has gone from becoming a nuisance to a legitimate threat to the confidentiality, integrity and availability of your data.
This is a particular problem when malware attacks are combined with other techniques such as phishing. Anti-spam filters are often unable to detect and prevent these emails from making it through, and anti-virus solutions are unable to detect the malware using signature-based matching.
Employees should be educated about malware and the risks that it poses. It's important that your security awareness programme includes information on what malware is, how exactly it behaves, how to recognise it and what to do if you become infected.
Your security awareness training can include information about common attack vectors such as ZIP files and macro-enabled Office documents. It's important to educate staff about the importance of backing up their files, particularly any email archives that they might have saved to their local disk.
7. Social Engineering
The single greatest threat to your security today is an attacker that’s skilled in manipulating human relationships. These attackers will attempt to gain the trust of somebody within your organisation in order to obtain information or access they otherwise wouldn’t have.
Scams such as business email compromise rely upon social engineering in order to be successful. Other social engineering pretexts may call unsuspecting employees and pose at the IT department. Social engineering is the #1 method that attackers will use to bypass your expensive firewall equipment.
To combat these threats our awareness training needs to educate employees about the nature of the risk and how it affects them. It's important that they understand a little bit about the psychology of influence (for example scarcity, reciprocity and urgency) so that they can better combat these attacks.
What do YOU think is important when it comes to security awareness training?
I’d love to hear YOUR comments below!
About The Author
Mike Carthy is an entrepreneur and cyber security specialist. He runs a successful business providing cyber security training to some of the world's largest companies, and dedicates his time to helping businesses to understand and tackle cyber threats. He's been featured in publications such as Laptop Magazine, The International Business Times and Computer Weekly.
Follow me on Twitter: @MichaelCarthy
Check out my blog: www.mikecarthy.com
Global Head and Sr. Director of Security Governance, a strategy level role for Risk & Compliance, M&A , Supplier Security. Also experienced in IT management, IT (security) operations, architecture and auditing.
7 年All big topics. Get the basics right: patch your systems timely, run malware/virus protection and do not run unsupported operations systems and applications, Stop saving money on hygene and...health will go up.
Human Resource/ Administrative Assistant
8 年This is a very nice take on a common problem in our industry. The lack of up-skill or reinforcement training has taken us back in recent years and are recently just beginning to use online resources to mitigate this. As an advocate for continuous self-learning and improvement, I asked my staff to enroll in online courses like those offered by Career Academy https://bit.ly/2hZxwU4 so that they can keep abreast with all the developments in our field. Following up on the resource provided here will surely help me reduce security breaches. With the help of our online training and the additional resources mentioned here, we hope to improve our training success. Thanks!
Corporate Communicator at M N M
8 年Nice Informative Post on the other hand , The two-factor authentication is most widely used MFA model followed by three-factor authentication model, wherein smartcard with PIN and one time password (OTP) is the most popular technique. Get Free PDF brochure Download : https://www.marketsandmarkets.com/pdfdownload.asp?id=877
Sr. Manager - Information Security Audit at BCD Travel
8 年Great article! I also believe the emphasis of blending how this impacts your employees personal lives along with professional is essential. Training associates to care for data as if it were their own is a reinforcement to protect data and systems not just when walking into an organizations doors but all aspects of their lives in the digital age.
CISO. Practical. Reasonable. Creative. Concise. Experience with FedRAMP, CMMC, ISO, SOC, NIST, and many more. Former LE SWAT Team Leader.
8 年Well said Mike. Short and sweet is the way to go and you certainly summed all the "low hanging fruit" into one article. I hope this get shared widely. Thanks for your contribution.