Top 10 Tips for Educating Employees About Cybersecurity

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Tips for Educating Employees About Cybersecurity-7 Next

Recognizing an Attack

Train employees to recognize an attack. It's critical that organizations have policies in place that assume they'll be infiltrated. Don't wait to react. Have a documented remediation plan in place and update or review it frequently. Communicate step-by-step instructions about what employees should do if they believe they've witnessed a cyber incident.

Training should include specific rules for email, web browsing, mobile devices and social networks. Don't forget the basics, such as physically unplugging the machine from the network and notifying the admin of any suspicious emails, activity or lost devices. Kaspersky suggests that employees should be able to locate their emergency IT contact number in 20 seconds or less.

Over the last year and a half, the world has become well acquainted with the idea of cyber data breaches. During 2014 and into this year, it seems like a new massive data breach has been reported week after week, with each seemingly exposing more records than the last. From Target to Home Depot to eBay to Anthem, most people have data at risk.

While these threats are most often initiated by outsiders – nefarious programmers writing malicious code designed to pilfer corporate data, siphon confidential customer information and/or raid company financial data – cyber criminals are too often able to gain access due to employees' ignorance and/or negligence.

It is therefore essential for every business to educate employees about cybersecurity, to train them before a breach occurs. In this slideshow, Kaspersky has identified 10 tips that can help you educate your employees and develop policies that will help mitigate ever-growing cybersecurity risks.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.