Zephyrnet Logo

Tips to Engage End Users in the Cyber Security Discussion Shared

Date:

If employees find the information uninteresting, they pay little attention and fail to apply the training when they encounter real-life cyber security threats. It’s far better to engage end users in a cyber security discussion where they participate and see themselves as part of the solution.

A NYC area cyber security consultant and managed services provider (MSP) shares tips to engage end users in the cyber security discussion in a new article on the eMazzanti Technologies website. The informative article first acknowledges that many security awareness training programs fail.

The author then urges readers to engage users in small, interactive sessions. He also advocates the use of technology, simulations, and games to boost engagement. He concludes by suggesting that trainers emphasize the why and relate the cyber security discussion to employees’ role and access.

“If employees find the information uninteresting, they pay little attention and fail to apply the training when they encounter real-life cyber security threats,” stated Almi Dumi, CISO, eMazzanti Technologies. “It’s far better to engage end users in a cyber security discussion where they participate and see themselves as part of the solution.”

Below are a few excerpts from the article, “Tips to Engage End Users in the Cyber Security Discussion.”

Make Cyber Security Discussion Groups Small

“For effective cyber security training, security experts suggest small groups or one-on-one meetings. Use them to identify and build realistic threat scenarios that employees relate to. For example, ask participants to draft a spear-phishing email using information about the company they know.”

Make the Discussion Interactive

“Unless you are an amazing presenter, your discussion group will lose interest quickly when you are the only one talking. Involving participants in the discussion is a proven way to keep their attention. Short, interactive training modules also keep users engaged and increase retention.”

Use Technology, Simulations and Games

“When used in the discussion sparingly, technology and videos help to get participants interested in the topic. For example, once users learn about compliance requirements and the dangers and signs of a phishing attack, they need to practice what they have learned.”

Relate the Cyber Security Discussion to Employees’ Role and Access

“A marketing executive faces different security threats than a machine operator on the shop floor. For example, the marketing VP may become the target of a spear-phishing campaign. Factory workers, on the other hand, need to understand how to recognize IoT cyber security threats to the Internet-connected machinery they operate.”

Experts Deliver Enterprise-Grade Email Security Training

To help organizations get the most out of their cyber security programs, eMazzanti offers targeted security awareness training. The company’s MXINSPECT email security solution uses an approach designed to engage employees and change behavior. Targeted, just-in-time training and phishing simulations teach users how to recognize and respond to phishing attacks.

Have you read?

Recent Hacker Attacks Underscore Need for Multi-faceted Cyber Security

IoT Cyber Security Requires a Deliberate Approach Due to Inherent Risks

About eMazzanti Technologies

eMazzanti’s team of trained, certified IT experts rapidly deliver increased revenue growth, data security and productivity for clients ranging from law firms to high-end global retailers, expertly providing advanced retail and payment technology, digital marketing services, cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring, and support.

eMazzanti has made the Inc. 5000 list 9X, is a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP, NJ Business of the Year and 5X WatchGuard Partner of the Year! Contact: 1-866-362-9926, info@emazzanti.net or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.

Share article on social media or email:

spot_img

Latest Intelligence

spot_img