ADVERTISEMENT Cybersecurity Awarement Month: Tips for Security Training from IBM How often have you heard a user say they RSHQHG D ¿OH RU HPDLO EHFDXVH WKH\ WKRXJKW LW ZDV WKH VHFXULW\ WHDP¶V UHVSRQVLELOLW\ WR PDNH VXUH QR YLUXVHV JRW LQ " (YHQ WKRXJK ZH¶UH WU\LQJ WR KHOS WKHP ZLWK WUDLQLQJ WKH IDFW WKDW LW¶V ZRUN UHODWHG RIWHQ LPSHGHV WKH GHOLYHU\ 1. Security Awareness Should Start at Home 5DWKHU WKDQ JLYLQJ XVHUV WUDLQLQJ WKDW FRQFHQWUDWHV RQ WKH ZRUNSODFH DQG WKHLU FRUSRUDWH UHVSRQVLELOLWLHV WXUQ WKH WUDLQLQJ DURXQG DQG IRFXV RQ KRZ XVHUV FDQ VHFXUH WKHPVHOYHV DW KRPH %\ JLYLQJ WKHP WKH WRROV EXW LQ D QHZ FRQWH[W \RX¶UH VWLOO HQIRUFLQJ WKH VDPH KDELWV EXW WKH UHLQIRUFHPHQW RI XVLQJ WKH VDPH WKRXJKW SDWWHUQV LQ ERWK ORFDWLRQV ZLOO JUHDWO\ LQFUHDVH WKH FKDQFHV RI WKHP EHFRPLQJ ORQJWHUP KDELWV 2QH RI WKH ELJJHVW KXUGOHV WR VHFXULW\ WUDLQLQJ LV PDNLQJ LW VRPHWKLQJ WKDW XVHUV ZDQW WR KDYH ,I D XVHU GRHVQ¶W ZDQW WR OHDUQ WKH WUDLQLQJ LV QRW JRLQJ WR KDYH DQ LPSDFW QR PDWWHU KRZ LPSRUWDQW LW LV 2. Make Training Sessions Engaging ,QVWHDG RI FRQFHQWUDWLQJ RQ WKH PDQGDWRU\ WUDLQLQJ RIIHU LQVWUXFWLRQ WKDW XVHUV ZLOO ZDQW WR DWWHQG 'UDZ LQVSLUDWLRQ IURP WKH ,QWHUQHW RI 7KLQJV,R7 IRU H[DPSOH $SSO\ WKH VDPH LGHDV DQG WRROV \RX¶G XVH IRU VHFXULQJ \RXU FRUSRUDWH HQYLURQPHQW EXW VKDSH WKH OHVVRQV DURXQG KRZ \RXU DXGLHQFH FRXOG HQVXUH WKDW QHZ ,QWHUQHWFRQQHFWHG UHIULJHUDWRU LV VHFXUH 0RUH WKDQ HYHU VHFXULW\ LV LQ WKH KHDGOLQHV VR RIIHU D EURZQEDJ PHHWLQJ RQFH RU WZLFH D PRQWK WR KHOS \RXU XVHUV XQGHUVWDQG VRPH RI WKH FRPSOH[LWLHV RI WKH WHFKQRORJ\ 3. Security Made Easy :H XVHG WR WHOO XVHUV QRW WR ZULWH GRZQ SDVVZRUGV EXW ZH DOO KDYH VR PDQ\ DQG WKH\¶UH DOO VR FRPSOH[ WKDW LW OHDGV XVHUV WR HLWKHU ZULWH WKHP GRZQ RU UHXVH WKH VDPH IHZ SDVVZRUGV RYHU DQG RYHU DJDLQ 'R VRPHWKLQJ WR PDNH WKLV SUREOHP D OLWWOH HDVLHU RQ \RXU DXGLHQFH ,QVWHDG RI ¿JKWLQJ WKLV WHQGHQF\ JLYH \RXU XVHUV D SDVVZRUG PDQDJHU WKDW ZLOO DGGUHVV ERWK SUREOHPV *LYHQ WKH DPRXQW RI PRQH\ ZH DOUHDG\ VSHQG RQ QHZ VRIWZDUH EX\LQJ OLFHQVHV IRU D SDVVZRUG PDQDJHU LV EDUHO\ D QRWLFHDEOH LQFUHDVH 1HHG PRUH KHOS " 6HFXULW\ LV D WRSLF WKDW GRPLQDWHV WKH PLQGV RI ¿QDQFLDO OHDGHUV ZRUOGZLGH ,%0 LV DW WKH IRUHIURQW RI WKH ¿JKW DJDLQVW EDG DFWRUV VHHNLQJ WR H[WUDFW YDOXDEOH LQIRUPDWLRQ IURP \RXU FRPSDQ\ :H RIIHU PDQ\ UHVRXUFHV IRU FRPSDQLHV RI DQ\ VL]H IURP 6HFXULW\ 3UHSDUHGQHVV DVVHVVPHQWV WR IXOO\ PDQDJHG VHFXULW\ RSHUDWLRQV IRU \RXU EDQN 9LVLW RU FDOO DQ\ WLPH IRU KHOS LQ WKH ¿JKW DJDLQVW F\EHUFULPH ,%0FRPVHFXULW\ ² 6HFXULW\,QWHOOLJHQFHFRP ² ___________________________ __________________http://www.qmags.com/clickthrough.asp?url=www.ibm.com/security&id=20378&adid=P8A2 http://www.qmags.com/clickthrough.asp?url=http://securityintelligence.com&id=20378&adid=P8A1