<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Security Awareness Archives - CIATEC</title>
	<atom:link href="https://www.ciatec.com/tag/information-security-awareness/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/tag/information-security-awareness/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Wed, 24 Jul 2019 07:25:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Information Security Awareness Archives - CIATEC</title>
	<link>https://www.ciatec.com/tag/information-security-awareness/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</title>
		<link>https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 29 Jun 2019 07:15:54 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Dubai]]></category>
		<category><![CDATA[Fraud Warning]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Information Security in Banking]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[UAE]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6323</guid>

					<description><![CDATA[<p>Dubai&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching #SecureYourAccount campaign to raise awareness on banking fraud. The video released Thursday on social media channels of both Dubai Police and Emirates NBD bank uses Shaggy&#8217;s year 2000 hit &#8220;It wasn&#8217;t me&#8221; tune but with changed lyrics &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Dubai</strong>&#8211; Emirates NBD and Dubai Police creatively joined efforts to come up with a two minutes video launching <a href="https://www.linkedin.com/feed/hashtag/?keywords=%23SecureYourAccount" target="_blank" rel="noopener noreferrer"><strong>#SecureYourAccount</strong></a> campaign to raise awareness on banking fraud.</p>
<p>The video released Thursday on social media channels of both <a href="https://www.facebook.com/dubaipolicehq.en/videos/323008325289946/" target="_blank" rel="noopener noreferrer">Dubai Police</a> and <a href="https://twitter.com/EmiratesNBD_AE/status/1144866167040991232" target="_blank" rel="noopener noreferrer">Emirates NBD</a> bank uses Shaggy&#8217;s year 2000 hit &#8220;<em>It wasn&#8217;t me</em>&#8221; tune but with changed lyrics to warn users about banking fraud through social engineering techniques.</p>
<p>As Information security awareness professionals at <a href="/" target="_blank" rel="noopener noreferrer"><strong>CIATEC</strong></a>, we loved the video that got all the elements of a successful <a href="https://www.ciatec.com/services/information-security-awareness-program/#samples" target="_blank" rel="noopener noreferrer">information security awareness material</a>. It is a job well done conveying the message of keeping personal banking information safe using a 20 years well known rap song. This type of awareness material has proven to have a high penetration rate among audience.</p>
<p>Enjoy the video, and always remember to #SecureYourAccount.</p>
<hr />
<p><em><strong>Many organizations struggle to convey information security awareness material to users and customers. If that sound like your organization, <a href="https://www.ciatec.com/services/information-security-awareness-program/#quote" target="_blank" rel="noopener noreferrer">contact us</a> today to start your <a href="https://www.ciatec.com/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</strong></em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/06/it-wasnt-me-dubai-getting-creative-on-banking-fraud-awareness/">&#8220;It Wasn&#8217;t Me&#8221; &#8211; Dubai Getting Creative on Banking Fraud Awareness</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Information Security Awareness Assessment Quiz for Employees</title>
		<link>https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Thu, 16 May 2019 19:40:34 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Employees security assessment]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Inofmration security training for employees]]></category>
		<category><![CDATA[Quiz]]></category>
		<category><![CDATA[security awareness assessment]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6292</guid>

					<description><![CDATA[<p>Information Security Awareness Assessment Quiz for Employees The first step in building a security awareness program is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly. The following security awareness assessment quiz is a beginner-level, 10 questions quiz &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">Information Security Awareness Assessment Quiz for Employees</span></h2>
<p>The first step in building a <a href="/services/information-security-awareness-program/">security awareness program</a> is to establish baseline by doing some assessment quizes, phishing campaign and some other methods to check employees awareness level and start building the awareness program accordingly.</p>
<p>The following security awareness assessment quiz is a <strong>beginner-level</strong>, <strong>10 questions quiz</strong> that can determine, for a certain extent, whether an employee is a security <strong>asset or a vulnerability</strong> that needs to be remediated. However, it is worth mentioning that there is no way to cover all information security domains in such a short quiz.</p>
<p>Similar information security trainings and <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulations</a>, along with comprehensive information security awareness material are all part of CIATEC&#8217;s information security awareness program. You can check program packages <a href="/services/information-security-awareness-program/#packages" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2><span style="color: #31aaa2;">Ready? Let&#8217;s go</span></h2>
<style type="text/css" id="wq-trivia-custom-css">.wq-quiz-6263 {
--wq-question-width: 100%;
--wq-question-color: #009cff;
--wq-question-height: auto;
--wq-bar-color: #31aaa2;
--wq-font-color: #444;
--wq-background-color: #f2f2f2;
}
</style><!-- wp quiz -->
<div id="wp-quiz-6263" class="wq_quizCtr single trivia_quiz wq-quiz wq-quiz-6263 wq-quiz-trivia wq-layout-single wq-skin-traditional" data-quiz-id="6263">
<div class="wq-questions wq_questionsCtr">
	<div class="wq-question wq_singleQuestionWrapper" data-index="0">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Your passwords should be easy to remember and hard to guess, which of the following is an example of strong password?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img fetchpriority="high" decoding="async" width="1280" height="856" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-300x201.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-768x514.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-1024x685.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3960205">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="kmawp">
			<label class="wq_answerTxtCtr">Passw0rd</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1esrj">
			<label class="wq_answerTxtCtr">29Feb1980</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="nmba7">
			<label class="wq_answerTxtCtr">MyPetName</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="d4cit">
			<label class="wq_answerTxtCtr">$ayN02#ackers</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A password should be at least 8 characters long and includes special characters, numbers, a mix of uppercase and lowercase letters and doesn't not contain a dictionary word or phrase. This will make it hard to guess by hacking scripts.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="1">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Personal Identifiable Information (PII) is used to verify your identity and distinguish one person from another. Which of the following is an example of PII?</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img decoding="async" width="1280" height="864" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - PII" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-300x203.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-768x518.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-1024x691.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-PII-220x150.jpg 220w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/TheDigitalWay-3008341/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">TheDigitalWay</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=1590455">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="8w1xi">
			<label class="wq_answerTxtCtr">ID Number</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4q279">
			<label class="wq_answerTxtCtr">Date of Birth</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="bstu9">
			<label class="wq_answerTxtCtr">Home Address</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="5f4g8">
			<label class="wq_answerTxtCtr">All of the answers are correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Personal identifiable information are "Personal" and should only be shared on need-to-know basis. Keep all your personal identifiable information (PII) to yourself and do NOT share it with any untrusted party.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="2">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? A phishing attack can harm your personal computer only, but not your company’s network.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img decoding="async" width="1280" height="832" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-300x195.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-768x499.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Phishing-1024x666.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/Tumisu-148124/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Tumisu</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3390518">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="n7qud">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="gr0io">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A phishing attack may download a worm or other form of malware that can easily spread over the network and cause harm to all computers, servers and network peripherals. </p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="3">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Information security is the responsibility of:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="745" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - NOC" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-300x175.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-768x447.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-NOC-1024x596.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="utjqb">
			<label class="wq_answerTxtCtr">Everyone in the company</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="4j5vd">
			<label class="wq_answerTxtCtr">IT Security Department</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ubvl9">
			<label class="wq_answerTxtCtr">Security Guard</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="60lz5">
			<label class="wq_answerTxtCtr">Top Management</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Information security is everyone's responsibility.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="4">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False? It is OK to use the same password for all your online accounts as long as you keep it a secret.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="918" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-300x215.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-768x551.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Login-1024x734.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/geralt-9301/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Gerd Altmann</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3938432">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="mlweo">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="1ufy1">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Don't put all your eggs in one basket. You don't want all your accounts to be comprised just because one account is hacked. Use a separate password for each account. To remember your passwords, you can fix a part of the password and make the second part variable and linked some how to the service used.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="5">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Spear Phishing is:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="768" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg" class="attachment-full size-full" alt="Information-Security-Awareness-Assessment-Quiz-for-Employees Spear" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-300x225.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Spear-1-768x576.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
			<span><a href="https://www.freepik.com/free-photos-vectors/character">Character vector created by freepik </a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="viyvh">
			<label class="wq_answerTxtCtr">An attack on your company’s email server</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vj4vp">
			<label class="wq_answerTxtCtr">A phishing attempt targeting you personally</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="xb0vj">
			<label class="wq_answerTxtCtr">A random attempt to hack any point of weakness</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="qzrx7">
			<label class="wq_answerTxtCtr">A massive spam email attack on all employees</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Spear phishing is a unique form of phishing in which the message is made to look as if it came from someone you know and trust as opposed to an informal third party.
Spear phishing works better than phishing because it uses information that it can find about you from email databases, friends’ lists, and the like. You can learn about the different types of phishing <a href="/2018/02/phishing-techniques/">here</a></p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="6">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Hackers can crack your passwords by repeatedly trying to guess it. This password cracking method is called:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="854" src="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg" class="attachment-full size-full" alt="Information Security Awareness Assessment Quiz for Employees - Password Hack" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/Information-Security-Awareness-Assessment-Quiz-for-Employees-Password-Hack-2-1024x683.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span> Photo by Soumil Kumar from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="k3gy1">
			<label class="wq_answerTxtCtr">The “G” attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vv26h">
			<label class="wq_answerTxtCtr">Brute-Force attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="sif2m">
			<label class="wq_answerTxtCtr">Phishing attack</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="wxdt9">
			<label class="wq_answerTxtCtr">None of the answers is correct</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">A brute-force attack works by repeatedly trying to guess your password until it is cracked. That is why you should always use long and complex passwords that will take ages to guess.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="7">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>True or False: Physical security is NOT related to information security.</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1280" height="853" src="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280.jpg 1280w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-768x512.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/electric-fence-71378_1280-1024x682.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" />	
			<span>Image by <a href="https://pixabay.com/users/PublicDomainPictures-14/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">PublicDomainPictures</a> from <a href="https://pixabay.com/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=71378">Pixabay</a></span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="hiu9q">
			<label class="wq_answerTxtCtr">True</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="a7sbm">
			<label class="wq_answerTxtCtr">False</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">Physical security controls are at the heart of any information security program. At the end of the day, information assets are stored on physical media such as hard disks, flash drives or simply papers.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="8">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>The FIRST objective of a "Security Aware Employee" is to be able to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1279" height="838" src="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528.jpg 1279w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-300x197.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-768x503.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/art-background-decorative-2249528-1024x671.jpg 1024w" sizes="(max-width: 1279px) 100vw, 1279px" />	
			<span> Photo by Miguel Á. Padriñán from Pexels</span>
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="i48j9">
			<label class="wq_answerTxtCtr">Avoid a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="8jfnq">
			<label class="wq_answerTxtCtr">Manage a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="7ydt1">
			<label class="wq_answerTxtCtr">Report a security threat</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="ix6gb">
			<label class="wq_answerTxtCtr">Recognize a security threat</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">The first step in the information security awareness ladder is to make sure that the average employee is able to identify threats and then report it to the right party. Threat avoidance and management are not the main responsibility of an average employee.</p>
		</div>
	</div>

	
</div>
<div class="wq-question wq_singleQuestionWrapper" data-index="9">

	
	<div class="wq_singleQuestionCtr">
		<div class="wq_questionTextWrapper quiz-pro-clearfix">
			<div class="wq_questionTextCtr">
				<h4>Tailgating is a form of social engineering that allows hackers to:</h4>
			</div>
		</div>

		<div class="wq_questionMediaCtr">
			<div class="wq_questionImage wq-question-image">
			<img loading="lazy" decoding="async" width="1024" height="1024" src="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg" class="attachment-full size-full" alt="" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-150x150.jpg 150w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-300x300.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/architecture-blue-sky-buildings-290275-768x768.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" />	
	</div>
		</div>

		<div class="wq-question-answers wq_questionAnswersCtr">
			
			<div class="wq-answers wq_answersWrapper">
			<div class="wq-answer wq_singleAnswerCtr" data-id="uv321">
			<label class="wq_answerTxtCtr">Watch company’s main gate 24/7</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="fruct">
			<label class="wq_answerTxtCtr">Get unauthorized access to restricted areas</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="9vd90">
			<label class="wq_answerTxtCtr">Watch employees as they leave the gate</label>
		</div>
			<div class="wq-answer wq_singleAnswerCtr" data-id="vaw5z">
			<label class="wq_answerTxtCtr">Following an employee after leaving work</label>
		</div>
	</div>
		</div>

		
		<div class="wq-trivia-question-explanation wq_triviaQuestionExplanation">
			<div class="wq-explanation-head wq_ExplanationHead">
				<span class="wq-explanation-head-correct">Correct!</span>
				<span class="wq-explanation-head-incorrect">Wrong!</span>
			</div>
			<p class="wq-explanation-text wq_QuestionExplanationText">In information security, tailgating is a social engineering technique used by hackers to deceive organization's officials through direct speech or actions in order to gain access into restricted areas. An example of tailgating is when one person tags along with an authorized employee to access a building or pass a certain checkpoint.</p>
		</div>
	</div>

	
</div>
</div>
<div class="wq-results wq_resultsCtr">
	<span class="wq-result-quiz-title wq_quizTitle">Information Security Awareness Assessment Quiz for Employees</span>
<div class="wq-result wq_singleResultWrapper" data-id="ffvm7">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">Your score is low. Security awareness is urgently needed. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/0-4-Score.jpg" alt="Awareness Quiz low score"></div>

	
	<div class="wq_resultDesc">We highly recommend that you get involved in an information security awareness program that will help you recognize cyber security threat when you see one. The good news is that we are here to help. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a></div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="497nf">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">There is a room for improvement. <br>
<img decoding="async" src="/wp-content/uploads/2019/05/5-7-score.jpg" alt="Awareness Quiz score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a sense of security when it comes to cyber threats, but there room for some improvement. We can help you with that. <a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<div class="wq-result wq_singleResultWrapper" data-id="38y5z">

	<div class="wq-result-score wq_resultScoreCtr">
			</div>

	<div class="wq-result-title wq_resultTitle">You have a good sense of security, you are an asset! <br>
<img decoding="async" src="/wp-content/uploads/2019/05/8-10-score.jpg" alt="Awareness Quiz high score"></div>

	
	<div class="wq_resultDesc">Your score indicates that you have a very good sense of security when it comes to cyber threats in the subject domains. But what about your colleagues? Do they all have the same security awareness level? <br>
A well implemented security awareness program will harden the human layer of security of security.<a href="/services/information-security-awareness-program/"><b>Learn more</b></a><br>
Share your results and challenge your friends.</div>

	<div class="wq-checked-answers-list"></div>
</div>
<!-- social share -->
<div class="wq-share wq_shareCtr">
			<p style="font-size: 14px;">Share your Results:</p>
	
			<button class="wq-share-fb wq_shareFB" data-url="https://www.ciatec.com/tag/information-security-awareness/feed"><i class="sprite sprite-facebook"></i><span>Facebook</span></button>
	
			<button class="wq-share-tw wq_shareTwitter" data-url="https://www.ciatec.com/tag/information-security-awareness/feed"><i class="sprite sprite-twitter"></i><span>Twitter</span></button>
	
	
	</div>
<!--// social share-->
</div><!-- End .wq-results -->
<!-- retake button -->
<div class="wq-retake-quiz wq_retakeQuizCtr">
	<button class="wq-retake-quiz-btn wq_retakeQuizBtn" type="button">
		<i class="wq-icon wq-icon-undo"></i>&nbsp; Play Again!	</button>
</div>
<!-- // retake button -->
</div>
<!-- // wp quiz-->

<h2><span style="color: #31aaa2;">Interested in our information security awareness services?</span></h2>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/information-security-awareness-assessment-quiz-for-employees/">Information Security Awareness Assessment Quiz for Employees</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Successful Cyber Security Awareness Program Elements</title>
		<link>https://www.ciatec.com/2019/02/cyber-security-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 13:42:16 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4928</guid>

					<description><![CDATA[<p>The Cyber Security Awareness Program Every Organization Needs Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to Gartner, spending on information security products and services reached a value of $114 billion US dollars in 2018, with an increase of 12.4 percent from 2017. On the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #31aaa2;"><span style="color: #800000;">The Cyber Security Awareness Program Every Organization Needs</span><br />
</span></h3>
<p>Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019" target="_blank" rel="noopener noreferrer">Gartner</a>, spending on information security products and services reached a value of <strong>$114 billion US dollars</strong> in 2018, with an increase of 12.4 percent from 2017. On the other hand, the average total cost of a data breach in 2017 was<strong> $3.62 million </strong>according to<a href="https://www.ibm.com/downloads/cas/ZYKLN2E3" target="_blank" rel="noopener noreferrer"> IBM and Ponemon Institute</a>. And 2019 forecasts are not any better. When you dig deeper in the studies, you realize that a high percentage of data breaches surprisingly took place in organizations of high IT security budget. And while some attacks could be traced back to disgruntled workers, a great deal of other attacks are simply a result of actions done by naive and non-harmful employees that simply weren&#8217;t well informed.</p>
<p>Over the past years, IT became the main enabler of almost every business. And security has always been a major concern. Implementing a security awareness program has become a must for an organization, regardless of it&#8217;s size, industry, or location.</p>
<figure id="attachment_5628" aria-describedby="caption-attachment-5628" style="width: 2415px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5628 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg" alt="Cyber Security Awareness Maturity Model" width="2415" height="1116" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg 2415w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-300x139.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-768x355.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-1024x473.jpg 1024w" sizes="(max-width: 2415px) 100vw, 2415px" /><figcaption id="caption-attachment-5628" class="wp-caption-text">Cyber Security Awareness Maturity Model [Source: SANS Institute]</figcaption></figure>At <strong>CIATEC</strong>, <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer"><strong>information security awareness</strong></a> is one of the main services provided. Our Security awareness program is a continuous cycle that goes around year. A well implemented security awareness program helps preventing a breach or at least mitigate the risks. In this article, we compiled lists of:</p>
<ul>
<li><a href="#main-reasons-of-cyber-security-breaches">Main causes of Cyber Security Breaches</a></li>
<li><a href="#Importance-Cyber-Security-Awareness-Training">Importance of Cyber Security Awareness and Training</a></li>
<li><a href="#Cyber-Security-Awareness-Topics">Cyber Security Awareness Topics</a></li>
<li><a href="#Cyber-Security-Awareness-Channels">Cyber Security Awareness Channels</a></li>
</ul>
<h3><span style="color: #800000;"><a id="main-reasons-of-cyber-security-breaches"></a>Top Reasons of Cyber Security Breaches</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>&nbsp;</p>
<figure id="attachment_5626" aria-describedby="caption-attachment-5626" style="width: 1677px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg"><img loading="lazy" decoding="async" class="wp-image-5626 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg" alt="" width="1677" height="736" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg 1677w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-300x132.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-768x337.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-1024x449.jpg 1024w" sizes="(max-width: 1677px) 100vw, 1677px" /></a><figcaption id="caption-attachment-5626" class="wp-caption-text">Reasons of Cyber Security Breaches</figcaption></figure>
<h4>1- Uninformed Employees</h4>
<p>Uninformed, naive and non-harmful employees lacking information security awareness and training tops the list of causes. Our experience taught us that technology alone cannot completely secure IT environments, there will always be the human factor involved, whether within IT department side or at end users side. Unfortunately, human brain cannot be patched same as a computer! It can only be nourished by knowledge, <a href="/services/training-courses/" target="_blank" rel="noopener noreferrer">training</a> and <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness material</a>.</p>
<p>It only takes one single uninformed employee who takes the bait of a phishing email to compromise organization&#8217;s cyber security.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Deploy <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">Information Security Awareness Program</a> that goes around the year and keep it up-to-date with the latest threat trends, accompanied with <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulation solution</a>.</em></p>
<h4>2- Human Errors</h4>
<p>Human errors of regular IT users are always a threat. However, the bigger threat are the errors done by IT administrators! Lack of knowledge, sometimes lack of focus leads to configuration errors that leaves some doors open for hackers.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Adapt a framework or a standard that organizes change, event, problem and incident management, such as ISO 27001, ISO 20000 or ITIL.</em></p>
<h4>3- Malware</h4>
<p>Successful malware attacks such as ransomware, viruses, worms, and trojans are always a threat to cyber security and a reason behind security breaches.</p>
<p><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">Hint</span></span></strong>: <em>Train your staff on how to deal with malware attacks and apply <a href="/services/defenses-and-controls/" target="_blank" rel="noopener noreferrer">endpoint security</a> best practices.</em></p>
<h4>4- Stolen Devices</h4>
<p>Laptops and mobile devices that are sometimes stolen during commuting or traveling pose a significant risk that should be handled by risk management.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Raising <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness</a> and applying mobile devices encryption.</em></p>
<h4>5- Disgruntled workers</h4>
<p>Dissatisfied employees and third-party contractors with bad intentions.</p>
<p><em><strong>Hint</strong>: Deploy proper employee termination, segregation of duties, and vendor management processes.</em></p>
<h4>6- Lack of Funds</h4>
<p>Low cyber security budget is a problem on its own for some organizations. While other organizations fall in the trap of &#8220;budget maldistribution&#8221;, where most of the budget goes for sophisticated security software and hardware appliances while employees information security awareness and training are neglected; <strong>Big Mistake!</strong></p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>If there is no way to increase cyber security budget, existing budget should at least be distributed properly.</em><span style="color: #0000ff;"><br />
</span></p>
<h3><span style="color: #800000;"><a id="Importance-Cyber-Security-Awareness-Training"></a>What will Security Awareness and Training add?</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Cyber security awareness and training provides the following benefits:</p>
<figure id="attachment_5622" aria-describedby="caption-attachment-5622" style="width: 1408px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg"><img loading="lazy" decoding="async" class="wp-image-5622 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg" alt="" width="1408" height="390" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg 1408w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-300x83.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-768x213.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-1024x284.jpg 1024w" sizes="(max-width: 1408px) 100vw, 1408px" /></a><figcaption id="caption-attachment-5622" class="wp-caption-text">Benefits of Cyber Security Awareness</figcaption></figure>
<h4>1-  Hardening the Last Layer of Defense</h4>
<p>Employees are the last layer of defense, and in some case they are the first layer, depending on the nature of the attack. Yet, they are the weakest link in the cyber security chain, this has become a universal truth. A well implemented and maintained cyber security awareness program will insure hardening this link and empowering a stronger network.</p>
<h4>2- Compliance Requirement</h4>
<p>All major information security standards and frameworks such as ISO/IEC 27001 requires an <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a> to be in place.</p>
<h4>3- Adapt with the Continuously Changing Threats</h4>
<p>The complexity of threats and attacks is increasing every day. Cyber security units needs to keep up and more importantly, cyber security awareness units needs to keep all users informed about the latest threats and cyber attacks trends.</p>
<h4>4- Increase Engagement</h4>
<p>Does your organization have an information security handbook containing all your information security policies? Is it updated and distributed to users on regular basis? If so, how many of them do actually read it, understand it and become familiar with its content?</p>
<p>With awareness things are different. Running cyber security awareness campaigns all over the year and on various channels will create a culture of security within the organization and engage employees in information security practices.</p>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Topics"></a>Cyber Security Awareness Topics</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Importance of cyber security awareness topics varies from one organization to another. Each organization has its own priorities. Yet, it is always recommended to work holistically on covering all topics when implementing a cyber security awareness program. The major topics that should be covered in an information security awareness program:</p>
<figure id="attachment_5624" aria-describedby="caption-attachment-5624" style="width: 2406px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5624 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg" alt="" width="2406" height="676" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg 2406w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-300x84.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-768x216.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-1024x288.jpg 1024w" sizes="(max-width: 2406px) 100vw, 2406px" /><figcaption id="caption-attachment-5624" class="wp-caption-text">Cyber Security Awareness Topics</figcaption></figure>
<h4>1- Physical Security</h4>
<p>Physical security is a sub-domain of information security that goes beyond IT to address issues related to entrance points, locked doors, drawers, cabinets, desks, as well as desktops, laptops and mobile devices security. Users should be aware and able to deal with physical security threats of all kinds.</p>
<h4>2- Data Security</h4>
<p>Cyber security is all about protecting information assets, right? Educating users on how to handle data security should be a major topic in any cyber security awareness program.</p>
<h4>3- Print Security</h4>
<p>Whether in hard copies or in soft copies, information needs to be secured. Print security is one of the many topics address in information security awareness program.</p>
<p>In addition to making users aware of concepts of secure printing, there are plenty of built-in and third-party printing solution that can be of great use in implementing secure printing policies.</p>
<h4>4- Network and Wireless Security</h4>
<p>Given the insecure nature of wireless networks, enterprises counts on employees awareness to better harden this area. An organization owned laptop or other mobile device, has at least 10 wireless networks SSID stored. SSID&#8217;s of office, home, airport, hotel, coffee shop&#8230;etc. Sniffing can occur on any wireless network jeopardizing the organization information assets. Hence, wireless network security awareness.</p>
<p>On the other hand, with sophisticated wired network security solutions, organizations might reach a significant level of security. Yet, awareness is always needed to harden the weakest link.</p>
<h4>5- Data Destruction</h4>
<p>Security doesn&#8217;t stop when you stop using a certain device. If a device still got your data, security policies will still apply, even if the device is not used any more. And if the device is to be disposed, it must be disposed securely. Cyber security awareness programs should cover topics on how to get rid of old devices in a secure manner.</p>
<h4>6- Password Security</h4>
<p>Password security is one of the most challenging domains in cyber security awareness. A lot of resistance is found here, users hate to be forced to remember new passwords and have a difficulty creating new passwords that meet complexity requirements.</p>
<p>Luckily, there is a solution: <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">CIATEC&#8217;s information security awareness program</a> helps users get over this.</p>
<h4>7- Phishing and Email Security</h4>
<p>Phishing attacks are getting serious. 9 out of 10 phishing attacks are now ransomware, and pseudo ransomware is a new trend. Pseudo ransomware attacks are here to make users pay a ransome for data that is not even encrypted!</p>
<p>Training on how to avoid phishing scams and what to do in the event of an attack is a high priority in cyber security awareness program. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing awareness and training</a> cycle goes through four steps: <strong>Asses</strong>, <strong>Educate</strong>, <strong>Phish</strong>, <strong>Get results</strong>, and <strong>REPEAT</strong>. Phishing awareness, like any other cyber security awareness component, is a continuous cycle.</p>
<p>For more info about phishing awareness: <a href="https://www.ciatec.com/phishing" target="_blank" rel="noopener noreferrer">ciatec.com/phishing</a></p>
<h4>8- Malware</h4>
<p>Users in any business industry, size, or even home users should have the ability to identify a malware attack when they see one. It is also important that users identify the malware type (virus, trojan, worm, adware, spyware, ransomware&#8230;). But what&#8217;s more important is to know how to act in the event of malware infection. A good cyber security awareness program should provide this know how.</p>
<h4>9- Mobile Devices Security</h4>
<p>Mobile devices, whether personal or corporate owned, holds information assets that must be protected. Mobile devices security is a serious topic that should be addressed thoroughly in a corporate cyber security awareness program.</p>
<h4>10- Browser Security</h4>
<p>Training users on how to check URLs and ssl encrypted site (i.e.<em>,</em><em>https</em>), keeping browsers up-to-date, minimal plugin usage, and scan any downloaded files are basic browser security awareness material.</p>
<blockquote><p>Cyber Security is everyone&#8217;s responsibility.</p></blockquote>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Channels"></a>Cyber Security Awareness Channels</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Communicating the information is as important as the information itself. What fits one organization, may not necessarily fit another. Communicating cyber security awareness material to the right audience and using the right channels is what an awareness program is all about. Here is a list of the most commonly used cyber security awareness channels.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-youtube-play " ></i> </span>Educational Videos</h4>
<p>Videos are one of the most effective learning material. CIATEC provides cyber security awareness videos hosted on CIATEC&#8217;s servers or on client&#8217;s portal. Like all cyber security awareness material, videos are continuously updated to keep up with the latest cyber security awareness trends as well as latest animation trends.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-picture-o " ></i> </span>Billboard or Roll-up Banners</h4>
<p>A roll-up banner in a meeting room, in the lobby, or any other public space will help raising cyber security awareness without an effort.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-desktop " ></i> </span>Screen Posters</h4>
<p>Same as roll-up banners, displaying cyber security awareness material on screens if available in public places will help raising cyber security awareness by targeting all staff.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-envelope-o " ></i> </span>Email Posters and Newsletters</h4>
<p>Email posters and newsletter is another channel, that can become handy when trying to address specific topics in cyber security awareness program. Especially, when presented as an element of a bigger campaign.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-gamepad " ></i> </span>Gaming material</h4>
<p>This has also proved to be one of the most effective techniques to pass the awareness message in atmosphere of fun and entertainment. Whether a simple cross-words puzzle or matching gaming, or much more sophisticated information security gaming material, it all helps to easily relay the information to users.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-book " ></i> </span>Educational Magazine</h4>
<p>Educational magazines, whether as e-magazine, email newsletter or a paperback. When published and distributed on regular basis it will keep users informed of the latest security trends and how to avoid breaches.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-users " ></i></span> Information Security Courses, Workshops, and Quizzes</h4>
<p>Old fashion class room training courses, and online courses are always a good channel to reach out to employees. In training, it is advised to group employees based on trades or departments. This way the trainer can address specific security topic that may be associated with the audience trade.</p>
<p>Training should also be followed by a quiz to measure cyber security awareness and training effectiveness.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-anchor " ></i></span> Phishing Simulations</h4>
<p>Proven to be one of the most effective ways to identify points of weakness against phishing attacks. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing simulations awareness campaigns</a>, as part of overall cyber security awareness program, use hundreds of templates and provides accurate reports identifying:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Users who opened the simulation email.</li>
<li>Users who clicked on links.</li>
<li>Users who submitted sensitive data.</li>
</ul>

		</div>
	
<p>This way, information security team can identify and educate employees accordingly. <em>Contact us <a href="/services/phishing-awareness/#quote" target="_blank" rel="noopener noreferrer">here</a> to start a phishing awareness campaign.</em></p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-globe " ></i> </span>Dedicated Information Security Portal and Mobile App</h4>
<p>A dedicated information security web portal will serve as a reference for all users in all information security matters within the organization and will help keeping users well informed. It may contain the below elements:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Information security policies.</li>
<li>Latest news about cyber security threats.</li>
<li>Educational posts.</li>
<li>Interactive educational videos with questions and answers.</li>
<li>Educational games and quizzes.</li>
<li>Information security courses.</li>
</ul>

		</div>
	
<p>A dedicated cyber security awareness mobile app is even better. It will allow information security units to reach users on the go.</p>
<p><strong>Hint</strong>: <em>By combining our <a href="/services/web-mobile-apps-ecommerce-consulting/" target="_blank" rel="noopener noreferrer">web and mobile enablement</a> skills along with <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">security awareness services</a>, CIATEC can build your information security web portal and mobile app in no time!</em></p>

		<div class="clearfix"></div>
		<hr style="margin-top:20px; margin-bottom:10px;" class="divider divider-solid">
	
<h3><span style="color: #800000;">Conclusion</span></h3>
<p>Cyber security awareness is no longer an option. It is a significant layer of security that every IT-enabled organization must have.</p>
<p><em><strong>CIATEC</strong>&#8216;s cyber security <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness program</a> is designed to help organizations of various sizes and industries to minimize the risk of data breaches. <a href="/contact" target="_blank" rel="noopener noreferrer">Contact us</a> today to start building your own program.</em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
