631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Modern Worker’s Cybersecurity Training

The Modern Worker’s Cybersecurity Training

The modern office can be a pretty monotonous place. When people do similar tasks over and over again, their attention to detail can wane. That may be a problem for your operational efficiency, but depending on what the expectations are, it likely won’t end your company. Ransomware, on the other hand, can be a major problem for any organization it affects. Today, we will share with you how to get your staff to care about the looming threats that target businesses from over the Internet.

What Threats?
Chances are that most of your employees don’t take network security into account. They have enough on their minds trying to manage their jobs to constantly be worried about a supposed threat coming to take your business down from out on the Internet someplace. This reluctance isn’t malicious in its intent, and from their perspective it’s hard to see that it’s their responsibility.

The fact is, however, that more than 90 percent of all cyberattacks start as a result of a spear phishing email clicked on by an unwitting employee.

Are You Engaged?
The best way to get the people that work for you to extend their vigilance is to level with them. Much like getting a customer to buy a product or service from you, you have to sell the value of diligence to your staff.

It goes a little like this:

Do you want a job (The answer is typically “yes”)? Then you will do what you can to help us keep the network free from malware or ransomware.

It’s as simple as that.

It’s not an elaborate sales job with several moving parts, it's a straightforward ultimatum. It’s something that anyone can understand.

Best Practices
Cybersecurity awareness training costs companies upwards of $1 billion. This is because anyone that works with a web-connected computer is a potential target for hackers. So, without spending thousands of dollars to have a professional come in and train your staff - only to have them make a mistake anyway - we thought we’d help by providing some of the main talking points you would find in the curriculum of one of these cyber security awareness classes.

  • Threats - Providing employees the information about the threats they are up against, who is deploying those threats, and how they could end up putting your organization in danger.
  • Password policies - Most businesses have some sort of password policy for access to sensitive information. Going over the NIST best practices with them will go a long way toward helping them understand what constitutes a strong password, and why they’re important.
  • Web practices and protection - Informing them how they are protected, and what they have to be on the lookout for.
  • Email practices and protection - Like the web protections, you have specific solutions installed that are aimed to protect your organization from unwanted phishing threats.
  • Preventative measures - These are proactive practices that can help keep them, and your network safe.

Educating your employees is paramount to protect your data, your clients’ data, and your reputation.

Once you’ve gone over all of this information with your team, they will have more information about the threats without you spending massive amounts time and money combating cyber security threats. If you would like help ensuring your staff understands your organization’s security strategies and follows industry best practices, reach out to Suffolk Computer Consultants today at 631-905-9617.

Powerful Physical Security Options
Tip of the Week: Improving Your Wireless Network


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Cloud Privacy Network Security Productivity Cybersecurity User Tips Malware Tech Term Managed IT Services Microsoft Backup Smartphones Communications Passwords Communication Efficiency Hackers Hardware Internet Business Management Google Email Small Business Android Software Outsourced IT Hosted Solutions Browser Ransomware Business Wi-Fi Mobile Device Data Backup Data Recovery VoIP Alert Applications Holiday Data Collaboration IT Support Microsoft Office Innovation Internet of Things Save Money Network Social Media Smartphone IT Services Windows 10 Cloud Computing Computer Managed IT Services Router Apps Password Access Control Users Twitter Miscellaneous Saving Money Wireless Business Intelligence Bandwidth Employer-Employee Relationship Mobile Devices Patch Management Settings Phishing Vulnerability Networking Virtualization Business Continuity Data Breach Workplace Tips Marketing Gadgets BDR Excel Word Office Blockchain Government Automation Information Analytics VoIP Data Management Gmail Remote Monitoring Law Enforcement Mobility Windows Managed Service WiFi Cybercrime Dark Web Scam Facebook Productivity Compliance Chrome Retail Tip of the week Remote Computing Tech Terms Connectivity Battery Virus Cortana Workers Virtual Assistant VPN Website Office 365 App BYOD Hacking How To Remote Monitoring and Management Paperless Office Spam Company Culture Computers Cost Management Medical IT Politics IT Support Mobile Device Management Wireless Charging Data Protection Physical Security Managed IT Service Artificial Intelligence Staffing SSD Office Tips Two-factor Authentication Automobile Authentication IT budget PowerPoint Botnet Amazon Data Security GDPR Knowledge Digital Internet Explorer Live Streaming Managing Stress Telephone Systems File Sharing Gadget Hard Drive disposal Profitability Files Information Technology Telephony Machine Learning A.I. Remote Support Inventory Tech Support Authorization User Tip IT Management Sports Hard Drives G Suite Storage Google Drive Comparison Edge Threat Safety Training WhatsApp Printer Server Dongle Remote Control User Security Shortcut Processors Value Eliminating Downtime Entertainment Biometrics Voice over IP Telecommute Movies Server Hosted Solution Recovery Lead Generation Mobile Security Google Maps Disaster Recovery Plug-In Bring Your Own Device Error Maintenance Specifications Laptop Printing Cables Security Cameras Cleaning Printers Spam Blocking Business Technology CrashOverride Spyware Wireless Internet Access eCommerce Data loss Unified Communications Big Data Copy Apple Operating System Troubleshooting Telecommuting Network Attached Storage Streaming Media Proactive IT Technology Tips Hybrid Cloud Spotify Touchscreen Antivirus Multi-Factor Security Conferencing Paper Voice over Internet Protocol Wearables News Reporting Email Management Sales HP Database Help Desk Licensing Online Shopping Staff RAM Upgrade Paste iPhone Phone System WannaCry Environment Update Education Smart Technology Millennials Server Management Downloads Hiring/Firing Backup and Disaster Recovery Microsoft Office 365 Content Filtering Ink Healthcare Telephone System Tablet Document Management Tactics Certification SaaS Travel Websites Microsoft Teams Work/Life Balance HIPAA e-waste Outlook Trends Managed IT Analysis Video Games Synergy Presentation Worker Lithium-ion battery IaaS Credit Cards Yahoo Television Encryption Augmented Reality Emoji Wireless Technology 5G IBM Printer Search HaaS Hacker The Internet of Things Vendor Management Budget Quick Tips Unified Threat Management Autocorrect Customer Relationship Management Avoiding Downtime Competition Current Events Dark Data IP Address Leadership Emergency Scheduling Regulation Samsung Customer Service Managed Service Provider Computer Care Net Neutrality DDoS Mobile Office Personal Information Instagram Domains Money Employer Employee Relationship Gaming Console Fun Windows 10 Scalability Freedom of Information Public Speaking

Newsletter Sign Up