390 likes | 558 Views
To know handy tips on using training to ensure data security and information security within the organization. Download this presentation.
E N D
93% of organizations in UK faced a security breach in 2012 Estimated losses: £450K to £850K Source: Source: Information Security Breaches Survey (2013)
Source: Ponemon Institute Research Report 85% of organizations in US were victims of security breaches in 2012 Estimated losses; $1.4 to $46 million
How Does Security Breach Happen? • Viruses, malwares, trojansetc • Intentional or unintentional breaches by employees • Loss of mobile devices containing data • SQL injection • Phishing • Cyber terrorism or espionage • Social engineering
$ $ $ $ $ $ Billions are spent towards internet security technology by organizations… Human element is generally overlooked.
(Source: Ponemon Institute Research Report) 39% of data breach is due to employee negligence
Data loss Reduces Information Security Loss by 75%
Safeguards employee interests as well as organizational interests
Ensures regular positive reinforcement of the need for IT Security
Elicits commitment towards information security from the employees
Key topics to be covered during training • Physical security
Key topics to be covered during training • Physical security • Desktop security
Key topics to be covered during training • Physical security • Desktop security • Password security
Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security
Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing
Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing • File sharing and copyright
Key topics to be covered during training • Physical security • Desktop security • Password security • Wireless networks security • Phishing • File sharing and copyright • Steps to be taken in case of a threat
Modes of Training • Web-based training
Modes of Training • Web-based training • Classroom training & workshops
Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies
Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies • Articles/posters/booklets/flyers Source: nie.edu.sg
Modes of Training • Web-based training • Classroom training & workshops • Online resources on security policies • Articles/posters/booklets/flyers • Pop-up reminders on network/LMS
Tips for IT Security training program Tip 1: Identification of threats
Tips for IT Security training program Tip 2: • Ease of comprehension
Tips for IT Security training program Tip 3: • Anecdotes, Real-Instances and Case studies
Tips for IT Security training program Tip 4: • Management buy-in
Tips for IT Security training program Tip 5: • Collective responsibility
Conclusion Lack of information and employee awareness is a major threat to Information Security. Well-thought out training program is the key to ensure that your organization’s data is protected and secured at all times.
To read articles on similar topics, please visit blog.commlabindia.com