LOGO WITH TEXT
  • Home
  • Privacy Policy
    • Disclaimer
  • About Us
    • Contact Us
  • Categories
  • Malaysia
Menu
  • Home
  • Privacy Policy
    • Disclaimer
  • About Us
    • Contact Us
  • Categories
  • Malaysia
Search
Home Adware

Are Employees Trained Enough To Tackle Cyberattacks? [Latest 2022]

Planetic Net by Planetic Net
August 5, 2022
in Adware, Ant, Art, Awareness, Bag, BASIC, Bee, Behavior, Budget, Business, Business process, Cat, Certification, Choice, Cloud computing, Company, Concept, Confidentiality, Cost, Courage, COVID-19, COVID-19 pandemic, Crime, Cryptojacking, Culture, Cyberattack, Cybercrime, Data, Data theft, Decision-making, Design, Digital badge, Digital transformation, Download, Drive-by download, Education, Email, Embezzlement, Employee engagement, Essen, Evaluation, Exercise, Experience, Expert, Funding, Future, Game, Google, Hand, Hip, IBM, Ice, Idea, IDEO, Insight, Instructor-led training, Insurance, Joe Biden, Knowledge, Language, Lead, Learning, Library, Lie, Literacy, Liver, Mail, Malware, Management, Map, Microcontent, Microlearning, Microsoft, Nature, Oat, Onboarding, Organization, Outsourcing, Pandemic, Partnership, Phishing, Port, Privacy, Profession, Rain, Ransomware, Rat, Recruitment, Reinforcement, Risk, Risk management, Security, Self, Sense, Simulated phishing, Simulation, Skill, Space, Spyware, Stra, Tea, Technology, They, Training, Uncategorized, Understanding, Video, Workforce, Workplace, Year
512
0
422
SHARES
1.1k
VIEWS
Share on FacebookShare on TwitterShare on WhatsappShare on TelegramShare on EmailShare on Wechat
Contents hide
1 A Sudden Surge In Security Training Procurement
1.1 6 Steps For Effective Cybersecurity Awareness Training
1.1.1 1. Assessing The Employee’s Online Behavior
1.1.2 2. Adopt The Right Training Approach
1.1.3 3. Embrace Hands-On Education
1.1.4 4. Strategize Training Budget
1.1.5 5. Outsourcing
1.1.6 6. Practical Evaluation
1.2 Quick Case Study
1.3 Retrospect The L&D Approach In Cybersecurity Training

A Sudden Surge In Security Training Procurement

The COVID-19 pandemic brought major changes in the business process. The digital transformation during the pandemic was impeccable, but it also made us more vulnerable to cybersecurity threats as we now have remote and hybrid work culture. Almost 90% of companies faced cyberattacks during the pandemic.

The estimated global cybercrime cost for the year 2021 was $7.9 trillion, and it is expected to reach $11.4 trillion by 2026. This includes cybercrime such as data theft or embezzlement, data hacking, and data destruction. After Joe Biden’s cybersecurity summit in the US (July 2021), technology giants Google, IBM, Amazon, Apple, and Microsoft offered up millions in funding on varieties of cybersecurity initiatives in which training (training workforce, dealers, and future talents) is one of the crucial aspects.

Globally, there has been a surge in cybersecurity training procurement in the last two years. More than 80 notable high-value cybersecurity training engagements/partnerships (defense, IT, and BFSI) took place in the year 2021. In the cloud computing and security awareness training space, supply dynamics have changed drastically with continuous mergers, acquisitions, and partnerships with cybersecurity solution providers, localization, and learning technology providers at a global and regional level.

6 Steps For Effective Cybersecurity Awareness Training

1. Assessing The Employee’s Online Behavior

It is critical to understand how an employee senses, recognizes, responds to, and reports nefarious activity. Even an errant click can give scope for data theft or any major cybercrime.

2. Adopt The Right Training Approach

Just self-paced video content or live Instructor-Led Training may not be the right choice for training here, considering the employee engagement quotient. Game-based learning and simulation-based learning are effective training modalities for the general workforce. In contrast, nano-learning and microlearning formats play a critical role in periodic knowledge reinforcement.

3. Embrace Hands-On Education

Talent shortage in cybersecurity is a piece of news generating a buzz, and most companies use training to mitigate the cybersecurity skills shortage. A training road map for IT professionals, microcertification with digital badges, encouraging internal workshops, tuition fee coverage for major certification programs, and AI powered serious gamified training formats can help organizations in upskilling and reskilling IT professionals for cybersecurity roles.

4. Strategize Training Budget

Large organizations add training to the cybersecurity budget. An ideal split of the budget is for 35% to be allocated to cybersecurity literacy for the general workforce (which includes fundamentals of cybersecurity) while 65% of the budget must be reserved for upskilling technical professionals with advanced cybersecurity modules and certifications as they are involved in risk identification, risk management, damage control, and digital security incidents during cyberattack incidents.

5. Outsourcing

Unlike other business training, cybersecurity training cannot be handled in-house, as the depth and breadth of cyberattacks are becoming exponential. As the style of cyber threats is changing day by day, with ransomware, cryptojacking, phishing, adware, drive-by downloads, spyware etc., large organizations outsource cybersecurity training services from specialized suppliers with robust courseware. Engaging with global service providers is essential to have a broad view of the nature of cybersecurity threats across different regions/countries.

  • Key points to check:
    • Suppliers’ in-house Subject Matter Expert (SME) expertise
    • Content library (basic, intermediate, and advanced versions of courses)
    • Advanced delivery modalities (edutainment content to ensure high engagement quotient)
    • Robust learning technology platform (to enrich learners’ experience)
    • Capability to create short burst content in multiple languages (microcontent or nano-content)
    • The frequency of course content updates should be taken into consideration to stay abreast of development in the cybersecurity space

6. Practical Evaluation

Checking learners’ course completion status may not be the right metric for evaluating learners’ understanding of cybersecurity concepts. Rather, floating a fake phishing email stream and checking their response practically is advised. Also, scenario-based simulation assessments are very effective in assessing learners’ knowledge.

Quick Case Study

A renowned banking, financial services and insurance (BFSI) company spent five months to develop a cybersecure workplace with a robust training framework:

1. The Learning and Development (L&D) team worked alongside the recruitment team to include cyberawareness training (“data privacy” module) during the onboarding process.

2. The internal L&D team and technical SMEs were involved in developing content for year-round training programs along with a US-based cybersecurity training service provider engaged for the purpose.

3. A simulated phishing exercise was used to evaluate the learners’ understanding.

4. The pre-assessment results of senior employees were surprising: only 38% of executive or director level people have a basic idea of cyber literacy.

5. The L&D team designed specialized training programs and workshops for executives and leaders, with game elements.

6. Senior executives found the customized training programs and workshops insightful and strongly believed that the training programs would help them in confident decision-making about cyber risks.

7. Managers were encouraged to have brown-bag discussions about the importance of cybersecurity and the scope of the damage.

Retrospect The L&D Approach In Cybersecurity Training

The L&D approach toward cybersecurity training must be changed. Cybersecurity training is not meant for IT professionals only; structurally, cybersecurity literacy should be treated as mandatory training for every single employee. Conducting periodic training for employees on the fundamentals of cybersecurity, such as phishing emails, data confidentiality, data breaches, and malware, is highly recommended.

Previous Post

Our Top Picks for the Best Classroom Tables for Kids [Latest 2022]

Next Post

Summer Reading Contest, Week 8: What Got Your Attention in The Times This Week? [Latest 2022]

Related Posts

AdobeStock scaled
Boston

Judge dismisses parents’ lawsuit over popular reading curricula [Latest 2022]

by Planetic Net
May 31, 2025
What are Learning Styles
Time

nytimes.com [Latest 2022]

by Planetic Net
May 30, 2025
AdobeStock scaled
Charter school

Dystopian Teacher Tales: The La Jollan Educational Missionary Society [Latest 2022]

by Planetic Net
May 30, 2025
Treasure Island San Francisco x
Chough

SF Planned to Improve Treasure Island’s Transit. Trump Took Back the Funds [Latest 2022]

by Planetic Net
May 30, 2025
AI SONGS cjlw facebookJumbo
Time

nytimes.com [Latest 2022]

by Planetic Net
May 29, 2025
AdobeStock scaled
Daily Dispatch

The Daily Digest: May 29, 2025 [Latest 2022]

by Planetic Net
May 29, 2025
blooms taxonomy verbs
Backward design

100+ Bloom’s Taxonomy Verbs For Critical Thinking [Latest 2022]

by Planetic Net
May 29, 2025
AdobeStock scaled
Child development

Instructional Coaching: Job-Embedded professional learning and compensation [Latest 2022]

by Planetic Net
May 29, 2025
Next Post
ny heatwave facebookJumbo v

Summer Reading Contest, Week 8: What Got Your Attention in The Times This Week? [Latest 2022]

shutterstock

Adobe Learning Summit 2022 [Latest 2022]

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

AdobeStock scaled

Judge dismisses parents’ lawsuit over popular reading curricula [Latest 2022]

May 31, 2025
What are Learning Styles

nytimes.com [Latest 2022]

May 30, 2025
AdobeStock scaled

Dystopian Teacher Tales: The La Jollan Educational Missionary Society [Latest 2022]

May 30, 2025
  • Trending
  • Comments
  • Latest
gettyimages custom e a d a b e d d a a x

Is Your House at Risk of a Wildfire? This Online Tool Could Tell You

0
indicators of authentic mobile learningc

9 Indicators Of Authentic Mobile Learning

0
Books to Read to Comfort After a Tragedy

Books to Read With Kids After a Tragedy

0
GettyImages

Generating Leads With An Authoring Tool Listing In The eLearning Industry Directory

0
AdobeStock scaled

Judge dismisses parents’ lawsuit over popular reading curricula [Latest 2022]

May 31, 2025
What are Learning Styles

nytimes.com [Latest 2022]

May 30, 2025
AdobeStock scaled

Dystopian Teacher Tales: The La Jollan Educational Missionary Society [Latest 2022]

May 30, 2025
Treasure Island San Francisco x

SF Planned to Improve Treasure Island’s Transit. Trump Took Back the Funds [Latest 2022]

May 30, 2025
LOGO WITH TEXT
Planetic.net | Education is a free website that has been designed to help students and a one stop hub for students seeking for information on scholarship, education, school and university tips and updates on different issues relating to education.
About Us

Useful links

  • Technology
  • Tool
  • Computer
  • Science
  • Robotics
  • Malaysia
  • Leadership

Quick Link

  • Home
  • Privacy Policy
  • Disclaimer
  • About Us
  • Contact Us

Other

  • Main site
  • Technology
  • Education
  • Health & Fitness
  • Travel
  • App

© 2022 Planetic.net. All rights reserved.

Newsletter

WANT MORE?

SIGN UP TO RECEIVE THE LATEST UPDATES AND NEWS, PLUS SOME EXCLUSIVE TIPS!