Employees Are Key To Cybersecurity

Cyber security training for employees could help nearly half the UK workforce to be more aware of threats as one in five say they could not identify a phishing email.

Staff awareness is not up to speed with the growing threat of cyber-attacks and 55% recall having had no training according to IT Governance. One in five employees are not sure they could identify a phishing email (a legitimate-looking email designed to extract information from the user). 

Those who had received training showed a much higher understanding of recognising and responding to cyber-attacks. As technology has developed and become more widely used across global organisations, phishing has become the favoured method of cyber criminals to gain information, such as account details and passwords. 

The Business Continuity Institute’s Cyber Resilience Report 2017 states that 57% of cyber security attacks were caused by phishing and social engineering, with 15% of organisations surveyed reporting more than ten cyber incidents in the past year.


With the EU General Data Protection Regulation (GDPR) drawing closer, organisations should be thinking about the security measures required to prevent the risk of a data breach and the potential damage that could follow. 

One of the key elements of achieving a privacy by design approach is adequate training to help employees recognise phishing and other cyber-attacks, which could prove harmful if not dealt with correctly.

Founder and executive chairman of IT Governance, Alan Calder, said: “Social engineering is a rapidly evolving threat. It is essential that professionals receive appropriate training to effectively deal with incidents and help organisations to avoid reputational damage from cyber-attacks.”

For Cyber Training please contact Cyber Security Intelligence for your company’s relevant options.

DigitalByDefault

You Might Also Read: 

Insiders Are Behind Most Business Cybersecurity Incidents:

Employees That Cause Data Breaches:
 

 

« Pentagon Considers Nuclear Retaliation To Big Cyber Attacks
Cyber Insurance: Good News & Bad News »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

UpGuard

UpGuard

UpGuard's discovery engine brings visibility to complex IT environments, enabling teams to identify risk, confirm compliance and make business safer.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Crayon

Crayon

Crayon is a customer-centric innovation and IT services company. We provide guidance on the best solutions for our clients’ business needs and budget with software, cloud, AI and big data.