Human readiness training

August 2017 Cyber Security, Training & Education

Most cyber breaches start with phishing attacks. Security research shows that employees regularly fall victim to phishing attacks, and thus represent the weakest link in any defence against illegal access to corporate infrastructure.

Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details (and, indirectly, money), often for malicious reasons, by disguising the criminal as a trustworthy entity in an electronic communication.

While the majority of corporate employees won’t fall victim to a phishing attack, at some point some will. When they do, it typically involves:

(a) Clicking a link that leads to a download website,

(b) Posting sensitive information to websites, or

(c) Opening high-risk attachments.

Phishing is prevalent because it provides big rewards for relatively little effort on the part of a hacker. Most security training programmes aimed at transforming employee behaviour fail at doing so, but it is not simply destiny, there is actually much more to be done.

What is required is a comprehensive awareness and behaviour change initiative focused on the most significant cyberthreat to organisations. CybeReady, a complete and interactive solution with a globally proven and well-established programme, systematically enables, measures and monitors behaviour change of staff (and risk profiles associated with phishing threats) over a prolonged period (one year). The initiative also provides management with customisable, on-line measurements and information on risk profiles, at all levels (individual, group, organisational), thereby providing management with a quantifiable means of measuring the extent of behaviour change of staff and organisational risk profile with respect to phishing attacks.

Four pain points

Existing anti-phishing programmes fail to adequately protect your organisation against an enormous threat. CybeReady’s data-driven learning solution minimises the risk of falling prey to even the world’s most sophisticated phishing attacks, so that employees can focus on their core business offerings – not on security threats.

Solving this complex problem involves an even more complicated solution. CybeReady has developed a hassle-free solution that enables organisations to offer the most advanced phishing readiness training without adding to security executives’ workloads or causing unnecessary operational headaches.

Security awareness programmes consume untold amounts of organisational resources. CybeReady helps companies save money by avoiding ineffective, costly anti-phishing options that don’t solve their problem. Within just 10 minutes a year per employee, the solution provides top value in demonstrated training outcomes without wasting precious resources.

With CybeReady, ease-of-use and optimal results go hand in hand, freeing up an organisation’s staff to tackle other critical objectives. This state-of-the-art smart learning engine constantly adapts personalised simulations and just-in-time training content. As phishing attempts evolve, so does CybeReady’s technology, constantly formulating new attacks and varied content – driving up engagement rates and providing proven results in the process.

Gold N’ Links Cyber, the providers of the CybeReady solution in South Africa, places great emphasis on assisting companies in preparing their members of staff to withstand and respond to the threats posed by cyber attacks. GNL Cyber offer a constantly adapting training service that addresses a range of training requirements and is a leading provider of next generation security solutions, services, technologies and education for corporate employees.

For more information contact Graham Wright, Gold N’ Links Cyber, +27 (0)83 252 5727, grahamw@gnlcyber.com, www.gnlcyber.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pwn2Own hacking contest to include industrial control systems
October 2019 , Cyber Security
As IT and OT converge under Industry 4.0 and digital transformation initiatives, security gaps are emerging in a range of popular industrial control systems.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
Stolen credentials on the Dark Web
October 2019 , Cyber Security, Security Services & Risk Management
Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.

Read more...
The importance of XDR for cyber protection
October 2019 , Cyber Security, Products
35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.

Read more...
Enterprise security must change
October 2019 , Cyber Security, Security Services & Risk Management
The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users.

Read more...
Kaspersky uncovers zero-day in Chrome
October 2019, Kaspersky , News, Cyber Security
Kaspersky’s automated technologies have detected a new exploited vulnerability in the Google Chrome web browser.

Read more...
Cybersecurity for video surveillance systems
September 2019, Mobotix , Cyber Security, CCTV, Surveillance & Remote Monitoring
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
African trust centre launches cyber division
November 2019 , Cyber Security
Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Cyber Security
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Protecting the outer perimeter with cloud services
November 2019 , Cyber Security
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Read more...