08 Сер, 2023

Security Awareness Staff Training

Introduction to Security Awareness Staff Training

Nowadays most people think they have a good knowledge of cyber hygiene, but statistics show that it is much easier to attack humans than systems or applications, because not everyone is as knowledgeable as they think. Unlike machines, people can make mistakes.         

However, hackers are constantly developing their skills and finding more and more new sophisticated ways of attacking, so now even experienced and knowledgeable employees can fall into their trap. In order to prevent this from happening, security training and education of both novice and more experienced employees should be conducted at least once a year. The information security team needs to keep up with all the changes in the world of hacking in order to respond quickly to new attack methods, integrate new approaches to security, and train employees to be prepared for all new threats. The security training itself should always be based on real attack simulations that are in line with the latest criminal trends.

Every year new threats appear, new malware is coded, and new phishing schemes are developed. If your team is unaware of these changes and unprepared to handle them, the risk of a successful attack increases until an attack becomes inevitable.

Security awareness training of employees is required both to pass the audit of the company during the certification session, such as SOC 2 certification, and just to eliminate the possibility of attacks such as phishing or social engineering, as a consequence of which the company can get a large financial loss.

Don’t skimp on this investment, as it may be the most important decision you can make to ensure the safety and stability of your business.

The price of awareness will vary depending on the desired result, for example if you need to prepare for certification – will have to hire a separate team to professionally assess the security of personnel, by conducting red team operations in which all vectors of attack will be tested from checking the awareness of office guards, ending with the company leaders.

Usually, such trainings are conducted by the team responsible for information security, providing training materials with various examples of attack implementation, checking the learning of materials in practice by simulating a real case. Employees go through the training material until they have fully absorbed it.

Topics that should be covered in cyber security training

1. Phishing as a part of social engineering is a type of Internet fraud whose main purpose is to gain access to users confidential data – logins (username or email) and passwords. By spoofing the official site in order to intercept valuable information.

To avoid such an attack, you need to pay attention to the accounts of users sending you messages and their content, namely links, because the essence of phishing attacks is to enter their data on a fake site.

For example, the official domain of Facebook, will be facebook.com, in case we want to go to our page we will have such a path https://www.facebook.com/login, but if we will be sent a phishing, it will be different from the official domain, having this form https://www.faceboook.com/login.

In the case of users, you need to pay attention to which email was sent from and, accordingly, the name of the sender.

For example, we can expect an email from John Baker from gmail. The official account will be [email protected], but when phishing we will see [email protected] or [email protected].

2. Password security – the essence of this problem is the neglect of employees to create strong or new non-repeatable passwords.

It is to avoid such cases that employees should be trained and made aware of the importance of all safety measures.

The presence of weak passwords leads to their picking or as among hackers, this method is called bruteforce.

If, however, the password is repeated in its entirety, then when a company leaks or maybe that password was used on external resources that had leaks, they can be repeated by intruders in order to gain profit.

If the password is partially repeated, it will be possible to match this password with a mask, and thus speed up the process of bruteforce.

3. Privacy issues – the essence of this problem is that employees may be negligent with critical data.

To solve this problem, you need to train employees how to store and use this data, namely, not to store it on personal drives (flash drive, for example), not to transmit them over an insecure channel and store this data in encrypted form.

4. Compliance is about complying with requirements such as the well-known GDPR, HIPAA, PCI.

It is important that employees adhere to the general rules that meet these requirements, they must know what it is and how it affects them personally.

5. Insider threats – this term describes the introduction into your company of an employee from a competitor’s company who may carry out various spying activities there.

It is important to teach employees to respond to excessive interest from internal employees to data they should not be interested in. For example, an employee from the human resources department rubs off on the developers and tries to get information from them about secret projects or blueprints.

6. CEO/wire fraud – very often attackers pretend to be in charge of the company in order to influence employees or get sensitive data from them.

It is important to teach employees to study the request from the leaders of the company and not to trust them 100%, it is better to contact and ask again than to give out secret information to a potentially fake director.

7. Office hygiene – being in the office you can’t always be sure that your data or device is safe.

We need to teach employees what to do in the office, which is not to leave your device open (not locked) or leave it in places where no one can see it, such as places where there are no cameras or people. As we already know from previous attack vectors, there could be spies inside the company who would be happy to find such a device and infect it with a virus or just steal data.

9. Hygiene when working remotely – against the backdrop of recent events, this has become especially relevant, a situation like to hygiene in the office, only outside the office.

Here, even more attention should be paid to the issue of security, your device should always be in your sight. It is also not recommended to look at sensitive data in public places and go under the public Wifi, even if you just need to send an e-mail, this is fraught with the fact that it can be intercepted by intruders.

Висновок

In conclusion, employee security awareness is a very important part of a company’s security strategy, because it is a fundamental level of defense. You can have the latest technology for security, but it can’t handle the fact that users themselves will inadvertently hand over data to intruders.

Our social engineering as a service {https://cqr.company/service/social-engineering/}, involves all phases of awareness assessment, from modeling, conducting a social engineering type attack, generating reports and providing recommendations for staff training.

Інші Послуги

Готові до безпеки?

зв'язатися з нами