Cyber Security Training That Employees Don’t Hate

Most employees hate taking cybersecurity awareness training. It doesn’t have be that way. If you want your security awareness training program to be effective, address some of the most common user complaints.

Here are five common complaints of security awareness training and the ways to make your people like and engage with Cyber Training to make them love it.

1. Cybersecurity awareness Training is said to be Boring
It can be boring, at least the way most organisations do it. Make it more exciting, vary it, and make it a game.
Security awareness training videos that look like professional, Netflix-style episodes are the ones I’ve seen employees ask for more of.  Security awareness training companies do this sort of thing, or professional production companies will customise videos for your company. 

2. Employees don’t understand the importance of security awareness training
Most end-users don’t understand the importance of security awareness training.  Make sure that employees know how important security awareness training is to their own success and to the organization’s. If the organisation has been hacked, don’t hide the details. Let all employees know how it happened, what the hacker did, and how it could have been avoided. 

3. Security awareness training isn’t Personal
If you want to make someone care, make it personal. Don’t just train them for protecting your business. Let employees know you care about them and their families. Give them training and tools to help them be more cybersecurity aware at home. Employees who train their spouses, parents, and children in cybersecurity awareness will be one of your best defenders at work.

4. Security awareness Training isn’t timely
Make sure your security awareness training program is personalised, targeted to the user’s role, and appropriate for the time of the season. For example, don’t give training on how to avoid fake invoices and malicious wiring transfers to employees who don’t pay bills.  Make sure all employees are trained on how to avoid fake information requests for their personal tax identification information and that HR/payroll department employees receive training in how to avoid fake information requests from someone claiming to be their organisation’s tax processor. 

Give instructions on how to avoid fake gift card scams around Christmas. Instruct people on how to appropriately patch their systems and how to appropriately recognise their installed anti-malware programs so they can’t be fooled by a fake version of either.

5. Security awareness Training feels punitive
You’ve got to motivate people to take the training, but if you make it fun and different, you can motivate people to want to learn more. The gamification I talked about earlier is a good way to do it. For example, tell every employee who reports 100% of all real and simulated phishing emails for a year, that they will get an Amazon gift card. 
Make the amount enough so that they will care. Then tell them to watch a few videos to learn about what to be on the lookout for. Tell them every month they’ll get a different topic and that they’ll be tested on that topic and others in the following month. 

Companies whose cybersecurity awareness training programs use all these tactics have employees who are better, happier, and safer because of them.

CSO Online:       GoCyber:

You Might Also Read: 

UK Workforce Lacks Basic Cyber Training:

_____________
For free Cyber training information please contact Cyber Security Intelligence  

 

 

 

« Cyber Training For Every US Federal Employee
A £370m Investment To Boost AI In Britain »

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Veridu Labs

Veridu Labs

Veridu provides a set of online tools to verify the identity of users to eliminate fraud and unwanted behavior.

Dimension Data

Dimension Data

Dimension Data specialising in IT services in areas including network integration, data centres and managed security.

IBM Disaster Recovery

IBM Disaster Recovery

IBM Disaster Recovery as a Service (DRaaS) provides continuous replication of critical applications, infrastructure, data and systems to the cloud so you can recover within minutes of an IT outage.

Alan Turing Institute

Alan Turing Institute

Alan Turing Institute is the UK national institute for data science. A major focus is Big Data analysis with applications including cyber security.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.