NCSAM: Is training to stay safe not sinking in? from blog The Technology blog and podcast
This is for the technology blog and podcast Commentary, articles, and podcasts
NCSAM: Is training to stay safe not sinking in?
The second post I found of interest deals with Phishing and the training behind it. In the question that Phishlabs posts for their first post in their series Training Not Sinking In? Try a Programmatic Approach Phishlabs dives in to several different topics they’ll be covering during the week. Headings in this blog post include:
- Choosing a Training Program
- Designing a Captivating Awareness Campaign
- Implementing a Reward & Remediation Strategy
Each section is quite ointeresting in this endeavor to train each and every one of us on how to stay safe as well as getting training that would benefit everyone in a company setting.
One tip is to take it slow, and not give a bunch of stuff in one setting.
Choosing the best training program isn’t enough, though. It’s critical that you understand how the organizational climate impacts training success. In
a later blog post, we’ll discuss this in detail.
I think this is very important. You may have older people involved in your company, and they may not understand this. I think that shorter lessons will be the key.
Just like my struggles in my braille course, training to spot problems before they are a problem for your small business, yourself as an individual, or even if you work for another business of any size, you need to understand what you’re looking for. In the braille course, its understanding the certain parts, and trying to put it all together. My mistake in this was to put it together based on my understanding of the thing, they wanted the typeforms. The same type of thing is crucial on protecting your business and even your personal finances. You don’t want to figure out how to pay bitcoin to someone just because you clicked on a link that said you did something, or you’re accused of something and it locks up your files.
There are different types of phishing, and I’m really not familiar with the different kinds too well. But this is why we’re learning together, and I’m happy to share what I can understand and of course what I think we should do.
Under the heading of designing a campaign: some of the bulleted points include:
• Choose a cohesive brand
• Include a mix of mediums
• Start marketing your program early
There are two things. First, I am not a marketer. Second, I don’t really have mediums, except for the blog (text) and audio (the podcast) which are both good. But I’d like to develop something and either sell it or offer it for free, but I just don’t know how.
Phishlabs has been doing this a long time, and I give them props. They’ve called me to let me know of issues, and I reached out to them for something. I love the work they do, so I want to pass their knowledge of this to my readers.
Under the rewards program, they write:
What drives your workforce to participate in security training or to practice good security hygiene? What keeps them accountable if they slip up? An effective
reward and remediation strategy that fits within your organizational culture is critical to achieving your learning objectives. As every organization is
different, there is no one-size-fits-all approach. Later this month, we’ll cover this topic in detail.
I’m definitely looking forward to see what they have to say on this. There is no one size fits all approach to teaching, so lets go!
Your thoughts are welcome, and I will await comments and suggestions. Thanks for reading!
Informazioni sull'articolo
NCSAM: Is training to stay safe not sinking in? was released on October 1, 2019 at 9:30 pm by tech in article commentary,security news and commentary.
Last modified: October 1, 2019.
Comments (2)
-
Comment by tech date 3 October 2019 alle 09:11 (),
This is a valid point, but if you do know your tech’s telephone number, or way of communicating, you’d know that the other was a scam or possible scam. Just something to think about. No answer is the right answer.
-
Comment by crashmaster date 2 October 2019 alle 23:00 (),
That does make me wander.
To much clicking the links, you’d think you wouldn’t.
On the other hand, get a crashy issue, a late tech, a scam call and a stressfull environment, put all those together and you could be forgiven if your brain didn’t do a bsod with critical stop.
My aunt had such an issue, a crash reported to tech support who sent out a tech, who was late due to a new system install in another location, in a stressfull situation made worse by the crash, getting a scam call, thinking it was the tech, and well there you go.
Realised when they wanted cash.
The tech came eventually did a reformat on the computers, and apologised for being late.
Point is, while training may or may not sink in, give any situation with the right conditions and you could easily melt down your cpu.
Leave a comment
You must be logged in to post a comment.
navigation menu
- Archives
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- October 2019
- September 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- December 2018
- November 2018
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- Categories of this blog
- Subscribe to Blog via Email
Join 10 other subscribers
- The tech blog’s pages
- Blogroll
- Crashmasters blog
- Cyberscoop
- Documentation
- Improve Internet Accessibility for Individuals with Impaired Vision
- International friends network stream
- Kim Komando
- Krebs On Security
- Plugins
- Register to this site
- Suggest Ideas
- Support Forum
- supporters and partners
- the blind perspective
- The Jared Rimer Network donations page
- The Phishlabs Blog
- The Security Box discussion list
- The Technology blog and podcast and TSB on amazon music podcasts
- Themes
- toptechtidbits
- WordPress Blog
- WordPress Planet
- “Blind VMS and the Tech podcast join forces”