SECURITY AWARENESS TRAINING

WITH THREAT PROTECT

TURNING STAFF
INTO SECURITY ASSETS

Using our expert knowledge and experience, we can get your workforce fully prepared for any security eventuality

CONSIDER THESE FACTS

97%

Of all employees can’t reliably identify phishing or spear phishing emails

93%

Of all data breaches start with an email attack

99%

Of the installed network security systems can’t stop a well-crafted spear phishing email

DO YOU WANT TO CREATE A SECURITY CULTURE?

Find ways to educate employees to recognise and report threats,
turning your staff into human firewalls

KNOWLEDGE AND
POWER AT ALL ECHELONS

Your network is a rich source of data. It's also an ever-expanding source of risk. WE HELP IMPROVE THE SPEED FOR REMEDIATION, NOT ONLY DO WE DETECT AND RESPOND TO THREATS, WE PREVENT THEM.

You’ll find our staff awareness training exceptionally easy to access, administer, and manage, giving you a clear picture of employees’ progress, and the value you’re getting out of the program.

SIMPLE
AND
EFFECTIVE

WHAT ARE THE RISKS FACED?


Removable media and personally owned devices:

Without clearly defined and usable policies on the use of removable media and personally owned devices, staff may connect devices to the corporate infrastructure that might lead to the inadvertent import of malware or compromise of sensitive information


Legal and regulatory sanction:

If users are not aware and supported in how they handle particular classes of sensitive information, the organisation may be subject to legal and regulatory sanction


Incident reporting culture:

Without an effective reporting culture there will be poor dialogue between users and the security team. This is essential to uncovering near misses and areas where technology and processes can be improved, as well as reporting actual incidents.


External attack:

Since users have legitimate system access and rights, they can be a primary focus for external attackers. Attacks such as phishing or social engineering attempts rely on taking advantage of legitimate user capabilities and functions.


Insider threat:

Changes over time in an employee’s personal situation could make them vulnerable to coercion, and they may release personal or sensitive commercial information to others. Dissatisfied employees may try to abuse their system level privileges or coerce other employees to gain access to information or systems to which they are not authorised. Equally, they may attempt to steal or physically deface computer resources.


Security Operating Procedures:

If security operating procedures are not balanced to support how users perform their duties, security can be seen as a blocker and possibly ignored entirely. Alternatively, if users follow the procedures carefully this might damage legitimate business activity.

ACHIEVE CYBER RESILIENCE

PROTECT AND SURVIVE THE GROWING THREAT LANDSCAPE

WANT TO RECEIVE NEWS ON THE LASTEST THREATS AND TRENDS

Sign up to receive the latest developments and news in the industry.

For information about how we handle your data, please read our privacy notice

TOP