Security Awareness training

Cybersecurity Awareness Training

“awareness training is a recognized practice for educating employees about cyber security”

Security awareness is the presence of mind possessed by an organization regarding the protection of the informational assets of that organization. Many organizations require formal security awareness training for all employees when they join the organization and periodically thereafter. Security awareness training is a recognized practice for educating employees about cyber security, Physical security, and the like – to heighten the knowledge and attitudes members of an organization possess regarding protection of the physical and especially the informational assets of your organization. Thorough security awareness training should educate about corporate policies, procedures and working with information technology. It is paramount for organizations to inform their employees and internal stakeholders to ensure that all are fully aware of their individual, compliant and statutory responsibility, and the consequences of failing to protect the organization from outside attackers and threat actors. Our trainings emphasize three main principles of information security – Protecting the Confidentiality of internal data, preserving the Integrity of data and information, and Availability by authorized personnel to the correct data (C.I.A.), information and critical assets contained therein, which also involve Passwords, Keystroke monitoring, and protecting audit data; and depending on the application and context, which of these principles are more important and in what settings and scenarios. Critical 18 offers Large Group awareness training and a more personalized service to increase self-awareness and bring about a desirable transformation in their corporate and personal lives. We also recommend annual refreshers, at a bare minimum.

Topics Include:

The nature of sensitive material and physical assets users may come into contact with, such as intellectual property, personally identifiable information, and sensitive financial data
Employees and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements
Requirements for proper handling of sensitive material in physical form, including marketing, transmission, storage and destruction
Proper methods of protecting sensitive information, including password policy and use of multi-factor authentication
How users can recognize and report Malware, Phishing, social engineering, etc.
Consequences of failure to properly protect information, including potential loos of employment, economic consequences to the company, damage to individuals whose personally identifiable information is divulged, and possible criminal penalties

Looking for Cybersecurity Services?