<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Phishing Awareness Archives - CIATEC</title>
	<atom:link href="https://www.ciatec.com/tag/phishing-awareness/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ciatec.com/tag/phishing-awareness/</link>
	<description>Information Security &#124; Information Technology &#124; Information Assurance &#124; Digital Strategy</description>
	<lastBuildDate>Wed, 15 May 2019 18:54:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8</generator>

<image>
	<url>https://www.ciatec.com/wp-content/uploads/2018/02/cropped-Ciatec-Icon-32x32.png</url>
	<title>Phishing Awareness Archives - CIATEC</title>
	<link>https://www.ciatec.com/tag/phishing-awareness/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</title>
		<link>https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Sat, 04 May 2019 09:43:31 +0000</pubDate>
				<category><![CDATA[CIATEC News]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Phishing Simulation]]></category>
		<category><![CDATA[Phishing training]]></category>
		<category><![CDATA[Phishing training for employees]]></category>
		<category><![CDATA[Phishmark]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=6155</guid>

					<description><![CDATA[<p>PhishMark: Phishing Training and Awareness Solution for Employees Why do companies need phishing training and awareness solution for their employees? &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)! And this year 9 out of &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="color: #31aaa2;">PhishMark: Phishing Training and Awareness Solution for Employees</span></h2>
<p><strong>Why do companies need phishing training and awareness solution for their employees?</strong> &#8211; In today’s world, 85% of IT security breaches are attributed to successful phishing and social engineering attacks targeting the weakest link in the cyber security chain (aka, employees)!<br />
And this year 9 out of 10 phishing attempts are ransomware attacks that encrypts your data and won’t release it unless a ransom is paid.<br />
And no matter how big the investment in high-tech security solutions is, the number of breaches from phishing and complicated social engineering attacks continue to rise bypassing all network security defenses and often making its way into users mailboxes. Luckily, Phishmark is here to reduce this risk, especially when implemented as part of a comprehensive <a href="/cyber-security-awareness/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">What is Phishmark?</span></h2>
<p><a href="http://www.phishmark.com" target="_blank" rel="noopener noreferrer"><strong>PhishMark</strong></a> is an affordable phishing simulation framework that allows information security staff to schedule and launch phishing simulation campaigns utilizing a variety of ready-made email templates. Campaign results will identify, in-real time, the users who took the bait, and provide awareness material on the spot by redirecting them into a pre-designed educational landing page. Statistical reports will provide top management with an overview of the current status and the progress of users in identifying and reporting phishing attacks and adapting safe habits.</p>
<h2><span style="color: #31aaa2;">Phishing Training for Employees &#8211; Life Cycle</span></h2>
<p>Once-a-year security awareness and training session is one way of doing things, yet, it is not enough! You need an on-going solution that meets the trends and can point out the weakest link so you can harden it.<br />
CIATEC’s PhishMark is the solution you need to empower &#8220;<strong>the human firewall</strong>&#8220;!</p>
<figure id="attachment_6177" aria-describedby="caption-attachment-6177" style="width: 300px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-6177" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png" alt="Phishing Training for Employees Life Cycle" width="300" height="297" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1.png 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishing-training-for-employees-life-cycle-phish-educate-analyze-300x297-1-150x150.png 150w" sizes="(max-width: 300px) 100vw, 300px" /><figcaption id="caption-attachment-6177" class="wp-caption-text">Phishing Training for Employees Life Cycle</figcaption></figure>
<p>Phishmark is a phishing training and awareness solution for employees that goes around the year running simulations to cover every angle a hacker might use to get into a company&#8217;s network through phishing and social engineering attacks. We follow the below steps:</p>
<ol>
<li><strong>Baseline</strong>: The first step is to establish baseline by running an initial campaign.</li>
<li><strong>Train</strong>: Provide awareness material based on the results of the first campaign.</li>
<li><strong>Phish</strong>: Run new phishing campaign.</li>
<li><strong>Analyze</strong>: Analyze the results and measure the progress.</li>
</ol>
<p>It is important to note that Phishmark is proven to provide better results when integrated with Ciatec&#8217;s <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a>.</p>
<h2><span style="color: #31aaa2;">PhishMark &#8211; Phishing Training Main Features</span></h2>
<h3>Dashboard</h3>
<p><img decoding="async" class="alignleft wp-image-6187 size-full" src="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg" alt="PhisMark - Phishing Training for employees" width="1601" height="332" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard.jpg 1601w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-300x62.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-768x159.jpg 768w, https://www.ciatec.com/wp-content/uploads/2019/05/PhisMark-Dashboard-1024x212.jpg 1024w" sizes="(max-width: 1601px) 100vw, 1601px" /></p>
<p>PhishMark will show a dashboard for all campaigns as well as separate dashboard for every single campaign. The dashboard will show:</p>
<ol>
<li>Number of phishing simulation emails &#8220;or baits&#8221; successfully delivered.</li>
<li>Number of employees that opened the simulation phishing email.</li>
<li>Percentage of employees that actually took the bait, i.e.; clicked the link.</li>
<li>Number of users who actually submitted data to the pretend hacker.</li>
<li>And finally, the information security specialist running the simulation will be able to count the number of employees that actually reported the threat.</li>
</ol>
<h3>Email Templates</h3>
<p>Administrator will be able to create his own email templates that fits his organization. Or use ready-made email templates covering many domains and season, including: Banking, social media, eCommerce and many more.</p>
<h3>Grouping Users</h3>
<p>The solution allows creation of target groups. Useful for targeting every department with a separate phishing campaign.</p>
<h3>Landing Pages</h3>
<p>Employees who fall victims for phishing campaigns will be redirected to a previously designed landing page similar to the below. Administrator is free to use ready-made phishing awareness landing pages provided by PhishMark, or upload his/her own.</p>
<figure id="attachment_6190" aria-describedby="caption-attachment-6190" style="width: 1024px" class="wp-caption alignright"><img loading="lazy" decoding="async" class="size-full wp-image-6190" src="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg" alt="Phishmark Phishing Training &amp; Awareness Landing Page" width="1024" height="683" srcset="https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example.jpg 1024w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-300x200.jpg 300w, https://www.ciatec.com/wp-content/uploads/2019/05/Phishmark-LandingPage-Example-768x512.jpg 768w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption id="caption-attachment-6190" class="wp-caption-text">Example Landing Page</figcaption></figure>
<hr />
<h2><span style="font-size: 14pt; color: #31aaa2;">Questions?</span></h2>
<p><span style="font-size: 14pt;">Ask us on ask@ciatec.com or <a href="/contact"><strong>contact us</strong></a> today to start using PhishMark to <strong>Phish</strong> and <strong>Mark</strong> employees that need further training and awareness on phishing and social engineering.</span></p>
<a href="/services/phishing-awareness/#quote" target="_blank" class="shortc-button medium green "><span style="font-size: 14pt;"><strong>Get a Quote</strong></span></a>
<p>The post <a href="https://www.ciatec.com/2019/05/meet-phishmark-ciatec-phishing-training-solution/">Meet PhishMark: Phishing Training &#038; Awareness Solution from CIATEC</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Successful Cyber Security Awareness Program Elements</title>
		<link>https://www.ciatec.com/2019/02/cyber-security-awareness/</link>
		
		<dc:creator><![CDATA[CIATEC Staff]]></dc:creator>
		<pubDate>Tue, 12 Feb 2019 13:42:16 +0000</pubDate>
				<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Information Security Awareness]]></category>
		<category><![CDATA[Phishing Awareness]]></category>
		<category><![CDATA[Security Awareness]]></category>
		<category><![CDATA[Security Awareness Training]]></category>
		<guid isPermaLink="false">https://www.ciatec.com/?p=4928</guid>

					<description><![CDATA[<p>The Cyber Security Awareness Program Every Organization Needs Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to Gartner, spending on information security products and services reached a value of $114 billion US dollars in 2018, with an increase of 12.4 percent from 2017. On the &#8230;</p>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #31aaa2;"><span style="color: #800000;">The Cyber Security Awareness Program Every Organization Needs</span><br />
</span></h3>
<p>Lack of cyber security awareness training and accountability tops the list of causes of information security breaches. According to <a href="https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019" target="_blank" rel="noopener noreferrer">Gartner</a>, spending on information security products and services reached a value of <strong>$114 billion US dollars</strong> in 2018, with an increase of 12.4 percent from 2017. On the other hand, the average total cost of a data breach in 2017 was<strong> $3.62 million </strong>according to<a href="https://www.ibm.com/downloads/cas/ZYKLN2E3" target="_blank" rel="noopener noreferrer"> IBM and Ponemon Institute</a>. And 2019 forecasts are not any better. When you dig deeper in the studies, you realize that a high percentage of data breaches surprisingly took place in organizations of high IT security budget. And while some attacks could be traced back to disgruntled workers, a great deal of other attacks are simply a result of actions done by naive and non-harmful employees that simply weren&#8217;t well informed.</p>
<p>Over the past years, IT became the main enabler of almost every business. And security has always been a major concern. Implementing a security awareness program has become a must for an organization, regardless of it&#8217;s size, industry, or location.</p>
<figure id="attachment_5628" aria-describedby="caption-attachment-5628" style="width: 2415px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5628 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg" alt="Cyber Security Awareness Maturity Model" width="2415" height="1116" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model.jpg 2415w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-300x139.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-768x355.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Maturity-Model-1024x473.jpg 1024w" sizes="(max-width: 2415px) 100vw, 2415px" /><figcaption id="caption-attachment-5628" class="wp-caption-text">Cyber Security Awareness Maturity Model [Source: SANS Institute]</figcaption></figure>At <strong>CIATEC</strong>, <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer"><strong>information security awareness</strong></a> is one of the main services provided. Our Security awareness program is a continuous cycle that goes around year. A well implemented security awareness program helps preventing a breach or at least mitigate the risks. In this article, we compiled lists of:</p>
<ul>
<li><a href="#main-reasons-of-cyber-security-breaches">Main causes of Cyber Security Breaches</a></li>
<li><a href="#Importance-Cyber-Security-Awareness-Training">Importance of Cyber Security Awareness and Training</a></li>
<li><a href="#Cyber-Security-Awareness-Topics">Cyber Security Awareness Topics</a></li>
<li><a href="#Cyber-Security-Awareness-Channels">Cyber Security Awareness Channels</a></li>
</ul>
<h3><span style="color: #800000;"><a id="main-reasons-of-cyber-security-breaches"></a>Top Reasons of Cyber Security Breaches</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>&nbsp;</p>
<figure id="attachment_5626" aria-describedby="caption-attachment-5626" style="width: 1677px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg"><img loading="lazy" decoding="async" class="wp-image-5626 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg" alt="" width="1677" height="736" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches.jpg 1677w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-300x132.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-768x337.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Cyber-Breaches-1024x449.jpg 1024w" sizes="(max-width: 1677px) 100vw, 1677px" /></a><figcaption id="caption-attachment-5626" class="wp-caption-text">Reasons of Cyber Security Breaches</figcaption></figure>
<h4>1- Uninformed Employees</h4>
<p>Uninformed, naive and non-harmful employees lacking information security awareness and training tops the list of causes. Our experience taught us that technology alone cannot completely secure IT environments, there will always be the human factor involved, whether within IT department side or at end users side. Unfortunately, human brain cannot be patched same as a computer! It can only be nourished by knowledge, <a href="/services/training-courses/" target="_blank" rel="noopener noreferrer">training</a> and <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness material</a>.</p>
<p>It only takes one single uninformed employee who takes the bait of a phishing email to compromise organization&#8217;s cyber security.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Deploy <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">Information Security Awareness Program</a> that goes around the year and keep it up-to-date with the latest threat trends, accompanied with <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">phishing simulation solution</a>.</em></p>
<h4>2- Human Errors</h4>
<p>Human errors of regular IT users are always a threat. However, the bigger threat are the errors done by IT administrators! Lack of knowledge, sometimes lack of focus leads to configuration errors that leaves some doors open for hackers.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Adapt a framework or a standard that organizes change, event, problem and incident management, such as ISO 27001, ISO 20000 or ITIL.</em></p>
<h4>3- Malware</h4>
<p>Successful malware attacks such as ransomware, viruses, worms, and trojans are always a threat to cyber security and a reason behind security breaches.</p>
<p><strong><span style="text-decoration: underline;"><span style="text-decoration: underline;">Hint</span></span></strong>: <em>Train your staff on how to deal with malware attacks and apply <a href="/services/defenses-and-controls/" target="_blank" rel="noopener noreferrer">endpoint security</a> best practices.</em></p>
<h4>4- Stolen Devices</h4>
<p>Laptops and mobile devices that are sometimes stolen during commuting or traveling pose a significant risk that should be handled by risk management.</p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>Raising <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness</a> and applying mobile devices encryption.</em></p>
<h4>5- Disgruntled workers</h4>
<p>Dissatisfied employees and third-party contractors with bad intentions.</p>
<p><em><strong>Hint</strong>: Deploy proper employee termination, segregation of duties, and vendor management processes.</em></p>
<h4>6- Lack of Funds</h4>
<p>Low cyber security budget is a problem on its own for some organizations. While other organizations fall in the trap of &#8220;budget maldistribution&#8221;, where most of the budget goes for sophisticated security software and hardware appliances while employees information security awareness and training are neglected; <strong>Big Mistake!</strong></p>
<p><span style="text-decoration: underline;"><strong>Hint</strong></span>: <em>If there is no way to increase cyber security budget, existing budget should at least be distributed properly.</em><span style="color: #0000ff;"><br />
</span></p>
<h3><span style="color: #800000;"><a id="Importance-Cyber-Security-Awareness-Training"></a>What will Security Awareness and Training add?</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Cyber security awareness and training provides the following benefits:</p>
<figure id="attachment_5622" aria-describedby="caption-attachment-5622" style="width: 1408px" class="wp-caption alignnone"><a href="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg"><img loading="lazy" decoding="async" class="wp-image-5622 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg" alt="" width="1408" height="390" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits.jpg 1408w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-300x83.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-768x213.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Benefits-1024x284.jpg 1024w" sizes="(max-width: 1408px) 100vw, 1408px" /></a><figcaption id="caption-attachment-5622" class="wp-caption-text">Benefits of Cyber Security Awareness</figcaption></figure>
<h4>1-  Hardening the Last Layer of Defense</h4>
<p>Employees are the last layer of defense, and in some case they are the first layer, depending on the nature of the attack. Yet, they are the weakest link in the cyber security chain, this has become a universal truth. A well implemented and maintained cyber security awareness program will insure hardening this link and empowering a stronger network.</p>
<h4>2- Compliance Requirement</h4>
<p>All major information security standards and frameworks such as ISO/IEC 27001 requires an <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">information security awareness program</a> to be in place.</p>
<h4>3- Adapt with the Continuously Changing Threats</h4>
<p>The complexity of threats and attacks is increasing every day. Cyber security units needs to keep up and more importantly, cyber security awareness units needs to keep all users informed about the latest threats and cyber attacks trends.</p>
<h4>4- Increase Engagement</h4>
<p>Does your organization have an information security handbook containing all your information security policies? Is it updated and distributed to users on regular basis? If so, how many of them do actually read it, understand it and become familiar with its content?</p>
<p>With awareness things are different. Running cyber security awareness campaigns all over the year and on various channels will create a culture of security within the organization and engage employees in information security practices.</p>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Topics"></a>Cyber Security Awareness Topics</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Importance of cyber security awareness topics varies from one organization to another. Each organization has its own priorities. Yet, it is always recommended to work holistically on covering all topics when implementing a cyber security awareness program. The major topics that should be covered in an information security awareness program:</p>
<figure id="attachment_5624" aria-describedby="caption-attachment-5624" style="width: 2406px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-5624 size-full" src="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg" alt="" width="2406" height="676" srcset="https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics.jpg 2406w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-300x84.jpg 300w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-768x216.jpg 768w, https://www.ciatec.com/wp-content/uploads/2018/11/Awareness-Topics-1024x288.jpg 1024w" sizes="(max-width: 2406px) 100vw, 2406px" /><figcaption id="caption-attachment-5624" class="wp-caption-text">Cyber Security Awareness Topics</figcaption></figure>
<h4>1- Physical Security</h4>
<p>Physical security is a sub-domain of information security that goes beyond IT to address issues related to entrance points, locked doors, drawers, cabinets, desks, as well as desktops, laptops and mobile devices security. Users should be aware and able to deal with physical security threats of all kinds.</p>
<h4>2- Data Security</h4>
<p>Cyber security is all about protecting information assets, right? Educating users on how to handle data security should be a major topic in any cyber security awareness program.</p>
<h4>3- Print Security</h4>
<p>Whether in hard copies or in soft copies, information needs to be secured. Print security is one of the many topics address in information security awareness program.</p>
<p>In addition to making users aware of concepts of secure printing, there are plenty of built-in and third-party printing solution that can be of great use in implementing secure printing policies.</p>
<h4>4- Network and Wireless Security</h4>
<p>Given the insecure nature of wireless networks, enterprises counts on employees awareness to better harden this area. An organization owned laptop or other mobile device, has at least 10 wireless networks SSID stored. SSID&#8217;s of office, home, airport, hotel, coffee shop&#8230;etc. Sniffing can occur on any wireless network jeopardizing the organization information assets. Hence, wireless network security awareness.</p>
<p>On the other hand, with sophisticated wired network security solutions, organizations might reach a significant level of security. Yet, awareness is always needed to harden the weakest link.</p>
<h4>5- Data Destruction</h4>
<p>Security doesn&#8217;t stop when you stop using a certain device. If a device still got your data, security policies will still apply, even if the device is not used any more. And if the device is to be disposed, it must be disposed securely. Cyber security awareness programs should cover topics on how to get rid of old devices in a secure manner.</p>
<h4>6- Password Security</h4>
<p>Password security is one of the most challenging domains in cyber security awareness. A lot of resistance is found here, users hate to be forced to remember new passwords and have a difficulty creating new passwords that meet complexity requirements.</p>
<p>Luckily, there is a solution: <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">CIATEC&#8217;s information security awareness program</a> helps users get over this.</p>
<h4>7- Phishing and Email Security</h4>
<p>Phishing attacks are getting serious. 9 out of 10 phishing attacks are now ransomware, and pseudo ransomware is a new trend. Pseudo ransomware attacks are here to make users pay a ransome for data that is not even encrypted!</p>
<p>Training on how to avoid phishing scams and what to do in the event of an attack is a high priority in cyber security awareness program. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing awareness and training</a> cycle goes through four steps: <strong>Asses</strong>, <strong>Educate</strong>, <strong>Phish</strong>, <strong>Get results</strong>, and <strong>REPEAT</strong>. Phishing awareness, like any other cyber security awareness component, is a continuous cycle.</p>
<p>For more info about phishing awareness: <a href="https://www.ciatec.com/phishing" target="_blank" rel="noopener noreferrer">ciatec.com/phishing</a></p>
<h4>8- Malware</h4>
<p>Users in any business industry, size, or even home users should have the ability to identify a malware attack when they see one. It is also important that users identify the malware type (virus, trojan, worm, adware, spyware, ransomware&#8230;). But what&#8217;s more important is to know how to act in the event of malware infection. A good cyber security awareness program should provide this know how.</p>
<h4>9- Mobile Devices Security</h4>
<p>Mobile devices, whether personal or corporate owned, holds information assets that must be protected. Mobile devices security is a serious topic that should be addressed thoroughly in a corporate cyber security awareness program.</p>
<h4>10- Browser Security</h4>
<p>Training users on how to check URLs and ssl encrypted site (i.e.<em>,</em><em>https</em>), keeping browsers up-to-date, minimal plugin usage, and scan any downloaded files are basic browser security awareness material.</p>
<blockquote><p>Cyber Security is everyone&#8217;s responsibility.</p></blockquote>
<h3><span style="color: #800000;"><a id="Cyber-Security-Awareness-Channels"></a>Cyber Security Awareness Channels</span></h3>

		<div class="clearfix"></div>
		<hr style="margin-top:10px; margin-bottom:20px;" class="divider divider-solid">
	
<p>Communicating the information is as important as the information itself. What fits one organization, may not necessarily fit another. Communicating cyber security awareness material to the right audience and using the right channels is what an awareness program is all about. Here is a list of the most commonly used cyber security awareness channels.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-youtube-play " ></i> </span>Educational Videos</h4>
<p>Videos are one of the most effective learning material. CIATEC provides cyber security awareness videos hosted on CIATEC&#8217;s servers or on client&#8217;s portal. Like all cyber security awareness material, videos are continuously updated to keep up with the latest cyber security awareness trends as well as latest animation trends.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-picture-o " ></i> </span>Billboard or Roll-up Banners</h4>
<p>A roll-up banner in a meeting room, in the lobby, or any other public space will help raising cyber security awareness without an effort.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-desktop " ></i> </span>Screen Posters</h4>
<p>Same as roll-up banners, displaying cyber security awareness material on screens if available in public places will help raising cyber security awareness by targeting all staff.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-envelope-o " ></i> </span>Email Posters and Newsletters</h4>
<p>Email posters and newsletter is another channel, that can become handy when trying to address specific topics in cyber security awareness program. Especially, when presented as an element of a bigger campaign.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-gamepad " ></i> </span>Gaming material</h4>
<p>This has also proved to be one of the most effective techniques to pass the awareness message in atmosphere of fun and entertainment. Whether a simple cross-words puzzle or matching gaming, or much more sophisticated information security gaming material, it all helps to easily relay the information to users.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-book " ></i> </span>Educational Magazine</h4>
<p>Educational magazines, whether as e-magazine, email newsletter or a paperback. When published and distributed on regular basis it will keep users informed of the latest security trends and how to avoid breaches.</p>
<h4><span style="font-size: 24pt; color: #31aaa2;"><i class="fa fa-users " ></i></span> Information Security Courses, Workshops, and Quizzes</h4>
<p>Old fashion class room training courses, and online courses are always a good channel to reach out to employees. In training, it is advised to group employees based on trades or departments. This way the trainer can address specific security topic that may be associated with the audience trade.</p>
<p>Training should also be followed by a quiz to measure cyber security awareness and training effectiveness.</p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-anchor " ></i></span> Phishing Simulations</h4>
<p>Proven to be one of the most effective ways to identify points of weakness against phishing attacks. <a href="/services/phishing-awareness/" target="_blank" rel="noopener noreferrer">Phishing simulations awareness campaigns</a>, as part of overall cyber security awareness program, use hundreds of templates and provides accurate reports identifying:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Users who opened the simulation email.</li>
<li>Users who clicked on links.</li>
<li>Users who submitted sensitive data.</li>
</ul>

		</div>
	
<p>This way, information security team can identify and educate employees accordingly. <em>Contact us <a href="/services/phishing-awareness/#quote" target="_blank" rel="noopener noreferrer">here</a> to start a phishing awareness campaign.</em></p>
<h4><span style="color: #31aaa2; font-size: 24pt;"><i class="fa fa-globe " ></i> </span>Dedicated Information Security Portal and Mobile App</h4>
<p>A dedicated information security web portal will serve as a reference for all users in all information security matters within the organization and will help keeping users well informed. It may contain the below elements:</p>

		<div class="checklist tie-list-shortcode">
<ul>
<li>Information security policies.</li>
<li>Latest news about cyber security threats.</li>
<li>Educational posts.</li>
<li>Interactive educational videos with questions and answers.</li>
<li>Educational games and quizzes.</li>
<li>Information security courses.</li>
</ul>

		</div>
	
<p>A dedicated cyber security awareness mobile app is even better. It will allow information security units to reach users on the go.</p>
<p><strong>Hint</strong>: <em>By combining our <a href="/services/web-mobile-apps-ecommerce-consulting/" target="_blank" rel="noopener noreferrer">web and mobile enablement</a> skills along with <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">security awareness services</a>, CIATEC can build your information security web portal and mobile app in no time!</em></p>

		<div class="clearfix"></div>
		<hr style="margin-top:20px; margin-bottom:10px;" class="divider divider-solid">
	
<h3><span style="color: #800000;">Conclusion</span></h3>
<p>Cyber security awareness is no longer an option. It is a significant layer of security that every IT-enabled organization must have.</p>
<p><em><strong>CIATEC</strong>&#8216;s cyber security <a href="/services/information-security-awareness-program/" target="_blank" rel="noopener noreferrer">awareness program</a> is designed to help organizations of various sizes and industries to minimize the risk of data breaches. <a href="/contact" target="_blank" rel="noopener noreferrer">Contact us</a> today to start building your own program.</em></p>
<a href="/services/information-security-awareness-program/#packages" target="_blank" class="shortc-button big orange "><strong>Check Awareness Packages</strong></a> <a href="/services/information-security-awareness-program/#samples" target="_blank" class="shortc-button big blue "><strong>Awareness Material Samples</strong></a> <a href="/services/phishing-awareness/" target="_blank" class="shortc-button big red "><strong>Phishing Awareness Solution</strong></a>
<p>The post <a href="https://www.ciatec.com/2019/02/cyber-security-awareness/">Successful Cyber Security Awareness Program Elements</a> appeared first on <a href="https://www.ciatec.com">CIATEC</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
