Cybersecurity End-User Training

We often talk about how important it is to include the people in your organization in your cybersecurity strategy. You are only as secure as the people operating your business. That’s why the team at thinkCSC loves getting the opportunity to spend time with our clients, providing them with the skills and insights they need to help keep their organizations safe.

Last week, Bill Wagg, thinkCSC’s Cybersecurity Evangelist and Vendor Relationship Manager, spent an afternoon with our legal team, Carlile Patchen & Murphy LLP, presenting our Cybersecurity End-User Training. The training focuses on the most common ways cyber criminals try to breach networks, including phishing, spear phishing, CEO fraud, and attachments. Bill also discussed the new Ohio Safe Harbor law and the NIST standards that must be followed to protect your organization.

Carlile Patchen & Murphy LLP takes cybersecurity seriously, and your organization should too. Providing cybersecurity end user training to your staff is an important step to take in protection your data and your organization. If you’re interested in having thinkCSC come to your organization, get in touch.

We offer a variety of employee awareness training, including how to:

Secure Personal Information – Do not use the same password on multiple devices and across multiple sites, including personal networks. Hackers can target specific individuals and explore a variety of networks, including social media, to obtain sensitive information. Passwords should be complex and changed periodically, and multifactor authentication should be applied whenever possible.

Use Available Protections – If professional devices are recommending updates, make sure employees are not ignoring prompts. Also encourage employees to secure their personal devices and provide accessible security options. By incorporating best security practices into their personal lives, employees are more likely to implement these practices in their professional realms.

Use Secure Networks Only – It can be tempting for employees to sign into an office network from home or from a coffee shop, even if it is only to check an email, quickly and innocently. Unsecured access, however, can give hackers the opportunity they need to infiltrate secure networks.

Be Aware of Threats – We teach employees to be suspicious of emails requesting private information. If an email requests immediate action, then a moment should be taken to confirm the request. Nothing is so immediate that your employees can’t take the time to verify a request with a supervisor.

Learn more about our employee awareness training. 

thinkCSC

Author thinkCSC

More posts by thinkCSC

Join the discussion One Comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.