Education institutions are targeted by thousands of cyber attacks every week All it takes is one ill-advised click on a suspicious link or attachment to leave your most important information vulnerable. If a data breach occurs, your organization could be on the receiving end of serious financial and reputational harm. Give your employees and students the knowledge they need to detect and report...
83% 1 of employees believe gamification motivates them to complete training These techniques, often associated with video games, have been proven to keep end users engaged with an immersive, enjoyable experience. When employees interact with gamified corporate training like Cyber Games, participation rates don’t take long to skyrocket. Score big points in the end user engagement department and...
Get and share the knowledge everyone needs to become a cyber hero! Establishing a strong security-aware organizational culture and changing user behavior is built on knowledge. To avoid data breaches, employees must be able to identify and report potential cyber threats. The Cyber Security Hub makes is easier than ever to obtain and distribute content on a variety of important cyber security...
As cyber criminals keep innovating, coming up with new and more damaging attacks every year, it’s crucial for organizations worldwide to train their staff to recognize these threats. According to a study by Mastercard, a staggering 95% of data breaches are due to human error. This statistic highlights the critical importance of training employees on modern cyber threats. Maintaining employee...
With cyber attacks posing a significant threat to businesses, especially to small ones where 60% don’t survive such an incident, the importance of regular and effective cyber security awareness training is more evident than ever. But what defines “regular?” What makes “effective?” This article explores the crucial aspect of training frequency. It’s not just about whether your employees undergo...
In an increasingly digital world, the safety of sensitive information is paramount. Unfortunately, nonprofits have become a goldmine for cyber criminals seeking to exploit their often limited security measures. These organizations, while operating with smaller teams and budgets, are responsible for substantial funds and sensitive data, drawing the attention of online predators looking for an easy...
Let’s be honest: cyber security employee training has a reputation for being dull. Most employees dread it. They expect dry training talks, lackluster presentations, and examples they can’t relate to. In any training, people must come first. You should create a model that focuses on the people you’re trying to reach: your own employees. A people-centric approach lets you focus your cyber security...
Cyber Monday is right around the corner and this means employees will be shopping online at work. To prepare for the busiest online shopping day of the year, companies need to remind employees of how to be safe online . It’s very easy for even the most cyber-aware employees to get caught up in the rush of online holiday sales and promotions. Retailers know that shoppers want deals and start their...
Leveraging a spirit of competition to drive engagement and create a security culture Gamification is a popular concept these days, and for good reason. With gamification, you can develop a game for learning more about a serious topic while also getting the learner to approach winning that game with the same fervor they would when playing for entertainment. So what happens when you integrate...
While certainly not the biggest data breach in recent memory, this Rogers Communications incident demonstrates how a seemingly small employee error can have significant consequences in the realm of cybersecurity. Data breaches have become major news topics and with good reason. These incidents have major implications not just for the businesses affected but also for their employees, their...
Nowadays, information security is a very common term used in the business world. Previously, security was simply a matter of installing a firewall to protect a corporate network by adding barriers to prevent intruders from access it. In the last few years, information has become electronic, or should I say virtual, in its primary form. What used to be on hard copy or paper form is now stored...