Top 10 Tips for Educating Employees About Cybersecurity

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Tips for Educating Employees About Cybersecurity-7 Next

Recognizing an Attack

Train employees to recognize an attack. It's critical that organizations have policies in place that assume they'll be infiltrated. Don't wait to react. Have a documented remediation plan in place and update or review it frequently. Communicate step-by-step instructions about what employees should do if they believe they've witnessed a cyber incident.

Training should include specific rules for email, web browsing, mobile devices and social networks. Don't forget the basics, such as physically unplugging the machine from the network and notifying the admin of any suspicious emails, activity or lost devices. Kaspersky suggests that employees should be able to locate their emergency IT contact number in 20 seconds or less.

Over the last year and a half, the world has become well acquainted with the idea of cyber data breaches. During 2014 and into this year, it seems like a new massive data breach has been reported week after week, with each seemingly exposing more records than the last. From Target to Home Depot to eBay to Anthem, most people have data at risk.

While these threats are most often initiated by outsiders – nefarious programmers writing malicious code designed to pilfer corporate data, siphon confidential customer information and/or raid company financial data – cyber criminals are too often able to gain access due to employees' ignorance and/or negligence.

It is therefore essential for every business to educate employees about cybersecurity, to train them before a breach occurs. In this slideshow, Kaspersky has identified 10 tips that can help you educate your employees and develop policies that will help mitigate ever-growing cybersecurity risks.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.