631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

The Modern Worker’s Cybersecurity Training

The Modern Worker’s Cybersecurity Training

The modern office can be a pretty monotonous place. When people do similar tasks over and over again, their attention to detail can wane. That may be a problem for your operational efficiency, but depending on what the expectations are, it likely won’t end your company. Ransomware, on the other hand, can be a major problem for any organization it affects. Today, we will share with you how to get your staff to care about the looming threats that target businesses from over the Internet.

What Threats?
Chances are that most of your employees don’t take network security into account. They have enough on their minds trying to manage their jobs to constantly be worried about a supposed threat coming to take your business down from out on the Internet someplace. This reluctance isn’t malicious in its intent, and from their perspective it’s hard to see that it’s their responsibility.

The fact is, however, that more than 90 percent of all cyberattacks start as a result of a spear phishing email clicked on by an unwitting employee.

Are You Engaged?
The best way to get the people that work for you to extend their vigilance is to level with them. Much like getting a customer to buy a product or service from you, you have to sell the value of diligence to your staff.

It goes a little like this:

Do you want a job (The answer is typically “yes”)? Then you will do what you can to help us keep the network free from malware or ransomware.

It’s as simple as that.

It’s not an elaborate sales job with several moving parts, it's a straightforward ultimatum. It’s something that anyone can understand.

Best Practices
Cybersecurity awareness training costs companies upwards of $1 billion. This is because anyone that works with a web-connected computer is a potential target for hackers. So, without spending thousands of dollars to have a professional come in and train your staff - only to have them make a mistake anyway - we thought we’d help by providing some of the main talking points you would find in the curriculum of one of these cyber security awareness classes.

  • Threats - Providing employees the information about the threats they are up against, who is deploying those threats, and how they could end up putting your organization in danger.
  • Password policies - Most businesses have some sort of password policy for access to sensitive information. Going over the NIST best practices with them will go a long way toward helping them understand what constitutes a strong password, and why they’re important.
  • Web practices and protection - Informing them how they are protected, and what they have to be on the lookout for.
  • Email practices and protection - Like the web protections, you have specific solutions installed that are aimed to protect your organization from unwanted phishing threats.
  • Preventative measures - These are proactive practices that can help keep them, and your network safe.

Educating your employees is paramount to protect your data, your clients’ data, and your reputation.

Once you’ve gone over all of this information with your team, they will have more information about the threats without you spending massive amounts time and money combating cyber security threats. If you would like help ensuring your staff understands your organization’s security strategies and follows industry best practices, reach out to Suffolk Computer Consultants today at 631-905-9617.

Powerful Physical Security Options
Tip of the Week: Improving Your Wireless Network
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Microsoft Cybersecurity Malware Google Tech Term Smartphones Communications Managed IT Services Communication Hackers Efficiency Backup Business Hardware Email Passwords Software Business Management Outsourced IT Internet Data Windows 10 Browser Android Innovation Hosted Solutions Ransomware Small Business Data Recovery Users Mobile Device Collaboration IT Support Mobile Devices VoIP Wi-Fi Data Backup IT Services Cloud Computing Microsoft Office Managed IT Services Holiday Applications Internet of Things Social Media Save Money Network Smartphone Alert Apps Employer-Employee Relationship Business Intelligence Workplace Tips Router Miscellaneous Saving Money Password Wireless Twitter Access Control Computer Bandwidth Data Management Marketing Data Breach Business Continuity Gadgets Phishing Settings Virtualization Patch Management Vulnerability Office 365 BDR Blockchain Excel Office Chrome Automation Word Analytics Government VoIP Information Paperless Office Networking Cost Management IT Support How To Windows Productivity Data Security Remote Monitoring Wireless Charging Mobility G Suite Data Protection Managed Service Law Enforcement Physical Security Managed IT Service Gmail Tech Terms Connectivity Facebook WiFi Cybercrime Website Retail Scam Compliance Virtual Assistant Dark Web VPN Workers Battery Spam Mobile Device Management Tip of the week BYOD Remote Computing Cortana Computers Virus Company Culture App Hacking Politics Remote Monitoring and Management Artificial Intelligence Medical IT Work/Life Balance Paste iPhone Safety Analysis Cryptocurrency Hard Drive disposal Millennials Outlook Machine Learning A.I. Inventory Information Technology Content Filtering Authentication IT Management Sports Managed IT Telephone System Gadget Amazon Office Tips Automobile Tablet GDPR Edge Threat Botnet Travel Dongle Processors Value Printer Server Profitability Telecommute Movies E-Commerce Lead Generation Mobile Security Entertainment Biometrics Big Data Authorization Shortcut Disaster Recovery Knowledge Storage Laptop Printing Hard Drives Recovery Live Streaming Training Bring Your Own Device Telephone Systems Maintenance File Sharing Time Management Spyware Cleaning Files Printers Telephony Eliminating Downtime Data loss Unified Communications CrashOverride Plug-In Payment Operating System Access Upgrade User Tip Network Attached Storage Streaming Media Server Remote Support Google Maps Google Drive Comparison Error Paper WhatsApp Cables Security Cameras Technology Tips Hybrid Cloud Antivirus Remote Control User Security Chrome OS HP Database Voice over IP Wireless Internet Staff RAM Hosted Solution Proactive IT instant Messaging WannaCry Environment Personal Information Troubleshooting Server Management Downloads Education Smart Technology Specifications Touchscreen Ink Phone System Voice over Internet Protocol Wearables Backup and Disaster Recovery Spotify Spam Blocking Business Technology Reporting Document Management Tactics Two-factor Authentication eCommerce Help Desk Websites Microsoft Teams Copy Apple Vulnerabilities HIPAA e-waste SaaS Telecommuting Update Trends Multi-Factor Security Conferencing Microsoft Office 365 IT budget PowerPoint Hiring/Firing News Healthcare SSD Email Management Sales Digital Internet Explorer Licensing Staffing Tech Support Online Shopping Certification Managing Stress Worker Fun IaaS IBM Freedom of Information Television The Internet of Things Credit Cards Hacker Emoji Budget Printer Competition Windows 7 HaaS Customer Relationship Management Yahoo Encryption IP Address Unified Threat Management Search Customer Service Mobile Office Leadership Quick Tips Vendor Management Current Events Domains Autocorrect Avoiding Downtime Regulation Computer Care Scheduling Net Neutrality Dark Data Windows 10 Samsung Public Speaking Presentation Managed Service Provider Gaming Console Emergency Instagram Lithium-ion battery DDoS Augmented Reality Money Scalability Synergy Employer Employee Relationship Wireless Technology 5G Video Games

Newsletter Sign Up