{"id":4434,"date":"2022-04-25T20:47:51","date_gmt":"2022-04-25T19:47:51","guid":{"rendered":"https:\/\/www.cardonet.com\/news\/?p=4434"},"modified":"2022-04-25T20:47:52","modified_gmt":"2022-04-25T19:47:52","slug":"how-to-build-a-successful-security-awareness-training-programme","status":"publish","type":"post","link":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/","title":{"rendered":"How to Build a Successful Security Awareness Training Programme"},"content":{"rendered":"\n<p><strong>Cybersecurity is critical for your business continuity. We invest a lot of time and money in the latest and strongest anti-viral software and firewalls. <\/strong><\/p>\n\n\n\n<p>But when it comes to security, the biggest hole in your defence system is often your employees. Human error can account for 90% of cybersecurity breaches. From weak passwords to clicking suspicious links, poor cybersecurity hygiene makes it that much easier for cybercriminals to access your systems.<\/p>\n\n\n\n<p>When businesses fail to prepare themselves against the potential of cyberattacks, they leave themselves open to;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Economic and financial loss<\/li><li>Reputational damage<\/li><li>Legal consequences<\/li><li>Loss of productivity<\/li><li>Disruption to business continuity&nbsp;<\/li><\/ul>\n\n\n\n<p>For this reason, an effective <strong><a href=\"https:\/\/www.cardonet.com\/news\/october-is-cybersecurity-awareness-month\/\">Security Awareness Training programme<\/a><\/strong> (SAT) is a valuable tool for your business. Training your workforce in cybersecurity is vital for business continuity. Keeping your employees educated and informed about cybersecurity is the best way to help them avoid making errors. SAT is about teaching employees to change their behaviour, create best practices and increase awareness of cybersecurity. It empowers your employees with the knowledge and ability to use technology safely.<\/p>\n\n\n\n<p>Here are some important points to think about when creating an SAT:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Persistence<\/strong>&nbsp;\u2013 training should be delivered frequently with refreshers in between. Cybersecurity should always be kept top of mind.<\/li><li><strong>Relevance<\/strong>&nbsp;\u2013 your training should be aligned to the most relevant security threats, so employees know how to recognise them and what to do.<\/li><li><strong>Engagement&nbsp;<\/strong>\u2013 keep training engaging and interactive to make training more manageable.<\/li><li><strong>Emphasise Importance<\/strong>&nbsp;\u2013 use real-life examples to showcase why cybersecurity is so important and what consequences can come of not treating it with due respect.<\/li><\/ul>\n\n\n\n<p>Your company should have a strong security policy that your employees are expected to uphold. Some security policies you should have include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Passwords<\/strong> \u2013 requiring strong, complex passwords and changing them every 30 days. Passwords must be stored correctly, preferably using a password manager tool and must not be shared with anyone. For more on the importance of passwords, <a href=\"https:\/\/www.cardonet.com\/news\/password-security-could-you-be-your-business-weakest-link\/\">click here<\/a>.<\/li><li><strong>Data Encryption<\/strong> \u2013 <a href=\"https:\/\/www.cardonet.com\/news\/data-encryption-a-guide-to-better-data-security\/\">encrypting your data<\/a> protects its confidentiality and adds another layer of security. This makes it harder for unauthorised personnel to access it. \u00a0<\/li><li>Administrator Privileges \u2013 these should be limited. Not everyone needs to have access to everything. The fewer people who have access to sensitive information, the less likely it is to be compromised.<\/li><li><strong>Phishing<\/strong> \u2013 with the high volume of emails we receive, phishing attacks are super common, training employees to recognise potential malicious links and phishing attacks is vital.<\/li><\/ul>\n\n\n\n<p><strong>If you\u2019re looking for a trusted IT partner to help you and your team build strong defences against cybercriminals, reach out to us today on&nbsp;<a href=\"http:\/\/+44%20203%20034%20224\/\" target=\"_blank\" rel=\"noreferrer noopener\">+44 203 034 2244<\/a>&nbsp;or&nbsp;<a href=\"http:\/\/+1%20323%20984%208908\/\" target=\"_blank\" rel=\"noreferrer noopener\">+1 323 984 8908<\/a><\/strong>.&nbsp;<strong>Alternately, you can<\/strong>&nbsp;<strong><a href=\"https:\/\/www.cardonet.co.uk\/contact-it-services.php\" target=\"_blank\" rel=\"noreferrer noopener\">contact us online<\/a>.&nbsp;We will be happy to help you overcome your IT challenges.&nbsp;<\/strong><\/p>\n\n\n\n<p><strong>Our friendly team will help guide you through your options and will help ensure that you get the right IT Outsourcing contract for your organisational needs.<\/strong>&nbsp;<strong>We have engineering bases in the United Kingdom, Europe and Southern California and our group of highly experienced engineers are available 24\/7 to assist and ensure that your business\u2019 IT infrastructure is running seamlessly.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is critical for your business continuity. We invest a lot of time and money in the latest and strongest anti-viral software and firewalls. But when it comes to security, the biggest hole in your defence system is often your employees. Human error can account for 90% of cybersecurity breaches. From weak passwords to clicking<\/p>\n","protected":false},"author":4,"featured_media":4435,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[520],"tags":[558,690,720,719,682,718],"class_list":["post-4434","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-business","tag-business-continuity","tag-cyber-awareness","tag-cyber-risk","tag-cyber-security","tag-cyber-threat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Build a Cybersecurity Awareness Training Programme<\/title>\n<meta name=\"description\" content=\"Cybersecurity is critical for your business continuity. A successful cybersecurity awareness programme is vital for your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Build a Cybersecurity Awareness Training Programme\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is critical for your business continuity. A successful cybersecurity awareness programme is vital for your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/\" \/>\n<meta property=\"og:site_name\" content=\"News\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-25T19:47:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-25T19:47:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rachael\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rachael\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Build a Cybersecurity Awareness Training Programme","description":"Cybersecurity is critical for your business continuity. A successful cybersecurity awareness programme is vital for your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/","og_locale":"en_US","og_type":"article","og_title":"How to Build a Cybersecurity Awareness Training Programme","og_description":"Cybersecurity is critical for your business continuity. A successful cybersecurity awareness programme is vital for your business.","og_url":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/","og_site_name":"News","article_published_time":"2022-04-25T19:47:51+00:00","article_modified_time":"2022-04-25T19:47:52+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg","type":"image\/jpeg"}],"author":"Rachael","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rachael","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#article","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/"},"author":{"name":"Rachael","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35"},"headline":"How to Build a Successful Security Awareness Training Programme","datePublished":"2022-04-25T19:47:51+00:00","dateModified":"2022-04-25T19:47:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg","keywords":["Business","Business Continuity","Cyber Awareness","Cyber Risk","Cyber Security","Cyber Threat"],"articleSection":["Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/","url":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/","name":"How to Build a Cybersecurity Awareness Training Programme","isPartOf":{"@id":"https:\/\/www.cardonet.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#primaryimage"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg","datePublished":"2022-04-25T19:47:51+00:00","dateModified":"2022-04-25T19:47:52+00:00","description":"Cybersecurity is critical for your business continuity. A successful cybersecurity awareness programme is vital for your business.","breadcrumb":{"@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#primaryimage","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2022\/04\/SAT.jpg","width":600,"height":334,"caption":"SAT"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cardonet.com\/news\/how-to-build-a-successful-security-awareness-training-programme\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News Home","item":"https:\/\/www.cardonet.com\/news\/"},{"@type":"ListItem","position":2,"name":"How to Build a Successful Security Awareness Training Programme"}]},{"@type":"WebSite","@id":"https:\/\/www.cardonet.com\/news\/#website","url":"https:\/\/www.cardonet.com\/news\/","name":"News","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/www.cardonet.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cardonet.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cardonet.com\/news\/#organization","name":"Cardonet","url":"https:\/\/www.cardonet.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","contentUrl":"https:\/\/www.cardonet.com\/news\/wp-content\/uploads\/2018\/06\/it-support-london-cardonet.png","width":1920,"height":1080,"caption":"Cardonet"},"image":{"@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cardonet.com\/news\/#\/schema\/person\/c62d005dc8af343ee7e1eeeb323cdf35","name":"Rachael","sameAs":["http:\/\/www.cardonet.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/comments?post=4434"}],"version-history":[{"count":0,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/posts\/4434\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media\/4435"}],"wp:attachment":[{"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/media?parent=4434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/categories?post=4434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cardonet.com\/news\/wp-json\/wp\/v2\/tags?post=4434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}