Employees Are Key To Cybersecurity

Cyber security training for employees could help nearly half the UK workforce to be more aware of threats as one in five say they could not identify a phishing email.

Staff awareness is not up to speed with the growing threat of cyber-attacks and 55% recall having had no training according to IT Governance. One in five employees are not sure they could identify a phishing email (a legitimate-looking email designed to extract information from the user). 

Those who had received training showed a much higher understanding of recognising and responding to cyber-attacks. As technology has developed and become more widely used across global organisations, phishing has become the favoured method of cyber criminals to gain information, such as account details and passwords. 

The Business Continuity Institute’s Cyber Resilience Report 2017 states that 57% of cyber security attacks were caused by phishing and social engineering, with 15% of organisations surveyed reporting more than ten cyber incidents in the past year.


With the EU General Data Protection Regulation (GDPR) drawing closer, organisations should be thinking about the security measures required to prevent the risk of a data breach and the potential damage that could follow. 

One of the key elements of achieving a privacy by design approach is adequate training to help employees recognise phishing and other cyber-attacks, which could prove harmful if not dealt with correctly.

Founder and executive chairman of IT Governance, Alan Calder, said: “Social engineering is a rapidly evolving threat. It is essential that professionals receive appropriate training to effectively deal with incidents and help organisations to avoid reputational damage from cyber-attacks.”

For Cyber Training please contact Cyber Security Intelligence for your company’s relevant options.

DigitalByDefault

You Might Also Read: 

Insiders Are Behind Most Business Cybersecurity Incidents:

Employees That Cause Data Breaches:
 

 

« Pentagon Considers Nuclear Retaliation To Big Cyber Attacks
Cyber Insurance: Good News & Bad News »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Herjavec Group

Herjavec Group

HG's Managed Security Services practice is SOC 2 Type 2 certified and defends your organization from increasingly sophisticated, targeted cybercrime threats.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

Australian Cyber Collaboration Centre (A3C)

Australian Cyber Collaboration Centre (A3C)

A3C assists business to understand and navigate the cyber ecosystem to address their specific cyber needs. It is a central connection point for businesses looking to improve their cyber resilience.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Network Intelligence

Network Intelligence

Network Intelligence are a global cybersecurity provider offering services across 6 broad spectrums - Assessment, BCMS, GRC, Professional Services, MSSP & Training.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

Venustech

Venustech

Venustech is a leading provider of network security products, trusted security management platforms, specialized security services and solutions.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.