Many companies treat security awareness training as an optional exercise or a superfluous operating expense, while others craft their programs for the sole purpose of compliance. In fact, a security-aware workforce is a vital component of revenue preservation and is necessary to protect the company and its partners, customers and employees.

The key to crafting a successful security awareness program lies in how the material is presented to the workforce. Training materials should be clear, timely and localized, and they need to encourage employees to own calls to action.

Invest in Employee Empowerment

Security leaders should hold their employees accountable for the collective security of the company. Insist that the IT team is not solely responsible for security — we all own it.

Security awareness education should empower employees to do the right thing when confronted with security events. Give employees the tools they need to make better security decisions, and encourage them to reach out to experts within the organization when a given situation is beyond their skills.

Security Training Materials and Resources

We all learn differently. Scan the web and you’ll find security awareness training programs available as webinars, computer-based trainings, short videos, posters, long and short narratives, audio learning and more.

Videos seem to work well for most. The SANS Institute offers security awareness videos under the “Securing the Human” series. The institute release its most recent video in May 2017. SANS, a nonprofit, is widely recognized as the gold standard in security awareness training.

Newsletters, posters and email updates work well to constantly remind employees of security issues. SANS offers a variety of free materials in this regard, including weekly newsletters that are suitable for sharing. The Infosec Institute even offers a tutorial on how to create your own security awareness newsletter.

Physical training courses are also important. While most companies address security and privacy during orientation programs, that is usually an inopportune time to conduct important training. Security leaders should present new employees with a quick overview of the security expectations and follow up this introduction with a more thorough training the following week.

For leaders seeking turnkey training materials, The Security Awareness Company offers enough artwork, personalized emails and videos to conduct a year’s worth of training with multiple touch points.

Some organizations may need to focus on a specific topic such as phishing, which one of the most common entry points for malware and ransomware. Anti-phishing training company PhishMe offers 17 computer-based training modules for free.

Security Awareness Is Contagious

Put all those materials together, and you will have a security awareness program to write home about. Next it’s time to empower your employees and managers to recognize the security champions within their departments. These individuals should be recognized for making the company more secure, perhaps on a quarterly basis. Security should also be acknowledged as a key performance indicator during annual reviews.

Security awareness is contagious, and soon your efforts and those of your employees will foster a culture of security where every individual strives to protect the company every day. Every action makes the company more secure, and every security champion plays an important role.

More from CISO

Emotional Blowback: Dealing With Post-Incident Stress

Cyberattacks are on the rise as adversaries find new ways of creating chaos and increasing profits. Attacks evolve constantly and often involve real-world consequences. The growing criminal Software-as-a-Service enterprise puts ready-made tools in the hands of threat actors who can use them against the software supply chain and other critical systems. And then there's the threat of nation-state attacks, with major incidents reported every month and no sign of them slowing. Amidst these growing concerns, cybersecurity professionals continue to report…

Moving at the Speed of Business — Challenging Our Assumptions About Cybersecurity

The traditional narrative for cybersecurity has been about limited visibility and operational constraints — not business opportunities. These conversations are grounded in various assumptions, such as limited budgets, scarce resources, skills being at a premium, the attack surface growing, and increased complexity. For years, conventional thinking has been that cybersecurity costs a lot, takes a long time, and is more of a cost center than an enabler of growth. In our upcoming paper, Prosper in the Cyber Economy, published by…

Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022.While the law has passed, many healthcare organizations remain uncertain about how it will directly affect them. If your organization has questions about what steps to take and what the law means for your processes,…

Charles Henderson’s Cybersecurity Awareness Month Content Roundup

In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes the specter of threats lurking behind our screens. Bombarded with horror stories about data breaches, ransomware, and malware, everyone’s suddenly in the latest cybersecurity trends and data, and the intricacies of their organization’s incident response plan. What does all this fear and uncertainty stem from? It’s the unknowns. Who might…