Terry Corbell, The Biz Coach
By Terry Corbell
Business Consultant

9 Tips to Train Employees to Protect You from Cybercrime



It takes a team approach to protect your organization against the skyrocketing rate of cybercrime.

Here are nine training precautions necessary to make sure your employees help you guard against security threats.

group ideasThey include:

1. Hold continuous discussions

It’s not enough simply to ask your employees to read and sign an IT policies’ statement.

There are constant new types of threats.

On a regular basis, explain the dangers of cyber threats – what it means to the organization and to their employment.

Your employees must be aware of their responsibilities.

Certainly, include discussions about mobile data. Encourage your employees to use the tactics at home, too.

2. Make sure to include everyone, especially management

Upper management is particularly vulnerable by virtue of their position in the organization. They have access to salient company and customer information.

Hackers know this. They also know IT staff has complete access to data.

3. Think of IT as a chain

A chain is only has strong as its weakest link. You can discuss cyber security regularly. But every person needs to be fully involved.

On a regular basis, explain the dangers of cyber threats – what it means to the organization and to their employment.

4. Social media

Employees need to be diligent about social media. Hackers are furtively looking for ways to trick people in blogs, e-mails, and social media. The criminals pose as friends or co-workers.

They ask innocent-looking questions to trick victims to click on links or to answer questions. All the while, the criminals are retrieving valuable data about your organization and customers.

5. Elements to include in training

Your workers need to be able to spot cyber attacks. They need to be given written policies to follow in an easy-to-understand checklist.

Rules should include:

— Computer Internet browsing

— E-mails

— All mobile devices such as smartphones and tablets

— Social media

— Unplugging computers

— Reporting suspicious e-mails and missing devices

— IT needs to be notified immediately (within 20 seconds)

6. Encourage employees not to worry about false alarms

Your employees should not to be afraid to report any developments – even if it’s a false alarm. However, review your training procedure if false alarms reoccur continuously.

7. Internal communications plan

Consider cyber insurance. Company-wide transparency is imperative. If there is a cyber attack, everyone should be informed and trained on what to do.

Right now, devise and implement a public relations strategy for the media, your customers and other stakeholders.

8. Test your employees’ knowledge

On an ongoing basis, test your employees. Synchronize the tests with your training. Look for ways to make it a serious program but make it fun and rewarding. Consider incentives for prompt employees.

9. Monitor your program

Some employees will be intimidated or not responsive, if they don’t understand what they need to do.

Some of your workers will not be conscientious. You can require changing passwords every week but you should anticipate some employees will take shortcuts. They’ll write down their passwords and leave them in unsecure locations or email passwords to themselves.

From the Coach’s Corner, here are related sources of information:

How to Enhance Security in Your Company’s Wireless Network – Do you take it for granted that your wireless network is secure? Don’t make that assumption. Wireless routers present dangers. Your router is vulnerable to hackers and, hence, security issues. If you’re really serious about security, WIFI might not be for you.

Secure Your Android from Viruses and Malware with 5 Tips — Hopefully, you haven’t had the nightmarish inconvenience on your Android from viruses and malware, which have plagued many users. Countless headlines detail the cyber dangers associated with Android-based devices. Don’t for a second assume you’d be safer with an iPhone.

4 Strategies for CEOs to Win Their Cyber Security Tug of War – The cyber security tug of war is never ending even though chief executive officers and board members now get the importance of protecting their companies’ information assets. They’ve learned to fear cyber-security threats because they could lose their jobs. If this is all true, why then are there incessant, worldwide cyber attacks?

Recruiting an IT Professional for Your Small Firm? 6 Tips for the Right Skills – Are you looking to add information technology personnel? You want to hire for a competitive edge, right? IT is a crucial position for you. The difference between failure and success requires reflection to hire for the right competencies.

Tips to Avoid Advertising Scams Tricking You to Ask for Tech Support — Advertising scams that prey on Internet consumers have prompted four Internet companies to band together to fight the abuse. The scams use harmless-looking ads to trick consumers into using phony tech support that actually enable cybercriminals to invade the unsuspecting owners’ devices.

People ask me all the time, “What keeps you up at night?” And I say, “Spicy Mexican food, weapons of mass destruction, and cyber attacks.”

-Dutch Ruppersberger


__________

Author Terry Corbell has written innumerable online business-enhancement articles, and is a business-performance consultant and profit professional. Click here to see his management services. For a complimentary chat about your business situation or to schedule him as a speaker, consultant or author, please contact Terry.




Enter Google AdSense Code Here
Seattle business consultant Terry Corbell provides high-performance management services and strategies.