OLD-SCHOOL VS NEW-SCHOOL

OLD-SCHOOL Classroom/PPTNEW-SCHOOL
Computer-Based
Tick-box driven, rushed & crammed into single sessions.Human-focused, designed to improve behaviour & culture.
Tick-box driven, rushed & crammed into single sessions.Human-focused, designed to improve behaviour & culture.
Boring, unengaging and difficult to retain key info.Bite-sized training, with interactive & engaging content.
Irregular training (e.g. once-per-year) with outdated content that misses out key threats.Ongoing and regular learning, with up-to-date content that addresses modern and relevant threats.
Difficult to measure progress, successes, failures & ROI.Easily report on progress, ROI & demonstrate compliance efforts.

4 REASONS TO DELIVER SECURITY AWARENESS TRAINING

Security-related incidents are reduced by 70% when businesses invest in cyber security awareness training.

Security-related incidents are reduced by 70% when businesses invest in cyber security awareness training.

A modest investment in training has a 72% chance of reducing the business impact of a cyber attack.

A modest investment in training has a 72% chance of reducing the business impact of a cyber attack.

According to Ponemon, even the least effective training programs have a 7-fold ROI.

According to Ponemon, even the least effective training programs have a 7-fold ROI.

93% of cyber security professionals agree that humans and tech need to work together to detect and respond to threats, like phishing.

93% of cyber security professionals agree that humans and tech need to work together to detect and respond to threats, like phishing.

COVID-19 PHISHING SCAMS

Look out for these Coronavirus (COVID-19) phishing scams doing the round

"COVID-19 TAX REFUND"

This phishing message claims to be a HMRC tax refund communication. Clicking on “access your funds now” would take you to a fake government webpage, encouraging you to input your financial and tax information.

"CLICK HERE FOR A CURE"

This message purports to be from a doctor who has details of a vaccine being covered up by the Chinese and UK governments. Clicking on the attachment takes you to a spoofed page designed to harvest login details.

"DOWNLOAD SAFETY MEASURES"

Here, hackers pretend to represent World Health Organization (WHO) and claim that an attached document details how recipients can prevent the disease’s spread.

"VIRUS IS NOW AIRBORNE"

Impersonation the CDC and claiming to offer information on local high-risk places, this phishing email will take you to a fake Microsoft login page and requests your email and password.

"DONATE HERE TO HELP"

Another CDC impersonation, this email asks for donations to develop a vaccine and requests payments be made in the cryptocurrency Bitcoin.

faq

Most common question about Security Awareness Training

Security Awareness Training is a program designed to educate employees about cybersecurity risks, how to recognize potential threats, and how to take appropriate actions to protect the organization’s data and systems.
It helps to reduce the risk of human error, which is one of the leading causes of data breaches. Training ensures that employees are equipped to recognize and respond to security threats like phishing attacks, social engineering, and malware.
Training should be conducted regularly, typically on an annual basis, with refresher sessions and updates whenever new threats emerge or significant changes to company policies occur.
Common topics include phishing, social engineering, password security, safe internet browsing, email security, physical security, mobile device security, and data protection.
It empowers employees to protect themselves and the organization from cyber threats, enhances their understanding of cybersecurity best practices, and reduces the likelihood of falling victim to cyberattacks.
Without proper training, employees are more likely to make mistakes that could lead to data breaches, financial loss, legal issues, and damage to the organization’s reputation.
Yes, training programs can and should be customized to address the specific risks and compliance requirements relevant to your industry.
Effectiveness can be measured through metrics such as the reduction in phishing click rates, the number of reported security incidents, employee assessment scores, and feedback from participants.
All employees, contractors, and any other individuals with access to the organization’s systems should undergo training, as security is everyone's responsibility.
There should be a clear policy in place for handling security violations, which might include additional training, disciplinary actions, or other measures depending on the severity of the breach.

5 BENEFITS OF CLOUD COMPUTING FOR SMALL BUSINESSES

DOWNLOAD YOUR FREE EBOOK NOW!

Why Choose Us

We Provide Outsourced IT Services
For your business

24/7 Customer support

We offer round-the-clock IT and cyber security support to ensure your business remains secure and operational at all times. Our team is always ready to assist with any technical or security issues.

Customized Service

No two businesses need the same IT solution. Netlogyx tailors solutions to fit your needs, avoiding unnecessary inclusions and ensuring the right fit for your business.

Smart solutions

We offer round-the-clock IT and cyber security support to ensure your business remains secure and operational at all times. Our team is always ready to assist with any technical or security issues.

Why Choose Us

We Provide Outsourced IT Services
For your business

24/7 Customer support

We offer round-the-clock IT and cyber security support to ensure your business remains secure and operational at all times. Our team is always ready to assist with any technical or security issues.

Customized Service

No two businesses need the same IT solution. Netlogyx tailors solutions to fit your needs, avoiding unnecessary inclusions and ensuring the right fit for your business.

Smart solutions

We offer round-the-clock IT and cyber security support to ensure your business remains secure and operational at all times. Our team is always ready to assist with any technical or security issues.