{"id":45221,"date":"2020-10-21T20:04:47","date_gmt":"2020-10-21T16:04:47","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=45221"},"modified":"2023-11-13T15:38:01","modified_gmt":"2023-11-13T11:38:01","slug":"guide-to-cybersecurity-training-programs","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/guide-to-cybersecurity-training-programs\/","title":{"rendered":"8 Dos and Don\u2019ts for Creating a Robust Cybersecurity Training Program"},"content":{"rendered":"<p>Effective cybersecurity involves a combination of robust automated processes and alert, well-trained employees. This means that you have to deliver <a href=\"https:\/\/www.msp360.com\/resources\/blog\/covid-19-and-cybersecurity\/\">cybersecurity training<\/a> which equips employees to do their job safely, but doesn\u2019t overload them. With that in mind, here are eight dos and don\u2019ts for creating a cybersecurity training program.<!--more--><\/p>\n<h2>Do Have Your Automated Cybersecurity Systems in Place First<\/h2>\n<p>You want automated systems to carry the bulk of the security load. Your employees should just be your \u201crear guard\u201d. Their task is to undertake last-stage checks and fill in gaps where automated security solutions are still weak, for example, during live phone conversations.<\/p>\n<p>Remember that modern cybersecurity has to protect remote and mobile users (and their devices) as well as people working from designated business premises. As a minimum, have all remote and mobile employees connect to your network over a VPN.<\/p>\n<h2>Don\u2019t Rely on Default Solutions and\/or Free Software<\/h2>\n<p>When it comes to application security, there is no silver bullet; a multi-layer approach is always required in order <a href=\"https:\/\/www.clouddefense.ai\/blog\/the-differences-between-sca-sast-and-dast\">to ensure that the software you create is secure.<\/a><\/p>\n<p>With the industry creating newer and more inventive tools constantly, including tools that combine multiple aspects of security testing, we can all be confident that software developers will continue to create rugged, safe, and high-quality software.<\/p>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<p>For that matter, there are now many great security tools available on the software-as-a-service (SaaS) model. The headline benefit of this is that companies can swap expensive up-front licensing fees for affordable monthly payments. Another benefit is that companies can scale their licensing up and down in line with their business needs.<\/p>\n<h3>Do Tailor Your Cybersecurity Training to Different Job Functions<\/h3>\n<p>The key to any sort of successful training is to keep it relevant. Some elements of cybersecurity training may need to be delivered to everyone. In many cases, however, there will be variations in what people really need to know. Sometimes these variations can be huge.<\/p>\n<p>For example, front-line workers may need training on <a href=\"https:\/\/www.msp360.com\/resources\/blog\/social-engineering-prevention\/\">how to handle social-engineering attempts<\/a> made over the phone or in person. Back-office workers, by contrast, may not have much, if any, contact with external parties, but may need training on <a href=\"https:\/\/www.msp360.com\/resources\/blog\/types-of-phishing\/\">how to identify phishing emails<\/a>.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE ASSETS<\/div>\n<div class=\"call-to-action__title\">MSP\u2019s Assets to Stay Safe from Phishing<\/div>\n<div class=\"call-to-action__text\">Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage and increase\u00a0security awareness.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-a13a0279-a667-42d1-8ecd-608964d3c162\" data-portal=\"5442029\" data-id=\"a13a0279-a667-42d1-8ecd-608964d3c162\"><span class=\"hs-cta-node hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\" id=\"hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a13a0279-a667-42d1-8ecd-608964d3c162\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing_CTA-1.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h3>Don\u2019t Encourage Staff to Try to Solve Problems Themselves<\/h3>\n<p>Cybersecurity is the exception to the old business saying that it\u2019s better to hand someone a solution than a problem. Even with cybersecurity training, employees trying to fix problems themselves are likely only to make matters worse.<\/p>\n<p>The core premise of your cybersecurity training should be that employees should do what they can to identify security problems and alert the IT team. Make it clear that nobody is going to get into trouble for this, not even if they made a mistake. Ideally, give them some idea of what will happen next.<\/p>\n<p>For example, if you\u2019re talking about how the IT team might deal with a suspected virus download, let them see a <a href=\"https:\/\/www.msp360.com\/connect\/\">remote desktop<\/a> in action. If you\u2019re talking about ransomware attacks, then explain how you use encryption and <a href=\"https:\/\/www.msp360.com\/managed-backup\/\">backups<\/a> to protect against them.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/on-training-employees-is-it-worth-the-risk\/\">On Training Employees: Is it Worth the Risk?<\/a><\/p>\n<h3>Keep Your Cybersecurity Training Focused on Real-World Issues<\/h3>\n<p>Educating your employees to trust your IT team helps to reduce the temptation for them to try to fix problems themselves. Develop a comprehensive understanding and educate your staff on how the web works to better solve complex problems. Establish problem-solving practices and logic for understanding advanced programming concepts.<\/p>\n<p>Remember that these issues may change over time, often in line with changing working practices. For example, over recent years, cyberattackers have been moving away from old-school \u201cspray and pray\u201d tactics and towards more sophisticated attacks based on social engineering.<\/p>\n<p>Putting this together with the present need for remote working and the challenges of implementing it safely, it\u2019s easy to see how companies are being left <a href=\"https:\/\/www.msp360.com\/resources\/blog\/protecting-the-remote-workforce-from-ransomware-and-other-threats\/\">vulnerable to ransomware attacks<\/a>.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/takeaways-from-2019-ransomware-attacks-on-msps\/\">Takeaways From 2019 Ransomware Attacks on MSPs<\/a><\/p>\n<h3>Do Deliver Cybersecurity Training in the Format That Best Suits Your Trainees<\/h3>\n<p>There are lots of different training approaches you can use. Ultimately, however, they all boil down to a choice between live training (even if it\u2019s delivered remotely) or self-guided training. Neither of them is objectively right or wrong for any situation, let alone all situations. It\u2019s all about what\u2019s best for the trainees.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ais-double-edged-sword-why-msps-must-educate-end-users-this-cybersecurity-month\/\">AI\u2019s Double-Edged Sword: Why MSPs Must Educate End Users This Cybersecurity Month<\/a><\/p>\n<h3>Don\u2019t Make Your Cybersecurity Training All About Threats and Fear<\/h3>\n<p>It\u2019s easy to paint security as being all about anticipating and preventing threats in order to avoid a company being damaged. This is true, but fear-based training can be a miserable experience for the participants and this is not good for anyone.<br \/>\nInstead, make a point of educating your staff on how learning about cybersecurity can benefit them. For example, you can explain to them how implementing effective cybersecurity measures can help companies to earn consumer trust and give companies an edge over their competitors.<\/p>\n<p>Always highlight all the ways the cybersecurity training can be used to help your staff keep themselves safe in their private lives as well. For example, you could point out how a good VPN will help them secure their Internet connection, protect their privacy, and conceal their identity, keeping them safe from hackers or anyone else who might be trying to keep tabs on their online activity.<br \/>\nAfter all, our society is now more digitally connected than ever before, and also more time than ever before is being spent online. Individuals and businesses should be interested in finding a good VPN for their routers, as routers <a href=\"https:\/\/privacycanada.net\/best-vpn-routers\/\">are the gatekeepers to our digital privacy<\/a> today.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/end-user-training-guide-for-msps\/\">Guide to End-User Training for MSPs<\/a><\/p>\n<h3>Do Keep Refreshing Your Training<\/h3>\n<p>People may return from a cybersecurity training session full of new knowledge and great intentions but, over time, that knowledge will fade unless it\u2019s refreshed. This means that you absolutely must keep running refresher training sessions. What\u2019s more, you need to keep them varied enough to keep people engaged and challenged.<\/p>\n<p>For example, if you keep repeating the same information in the company newsletter or sending out the same \u201cphishing email\u201d, then staff are soon going to get bored of it and\/or wise to it and your effort will be wasted. A good way to get around this is to look for interesting topics in cybersecurity news and build your refresher training around that.<\/p>\n<h3>Don\u2019t Make a Big Deal of People Struggling with their Cybersecurity Training<\/h3>\n<p>By all means, reward people who do well in their cybersecurity training. Do not, however, make a big deal out of people struggling with it. Give them all the support they need until they grasp it. Then make sure that they continue to receive ongoing support for as long as they need it. This may be indefinitely.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Effective cybersecurity involves a combination of robust automated processes and alert, well-trained employees. This means that you have to deliver cybersecurity training which equips employees to do their job safely, but doesn\u2019t overload them. With that in mind, here are eight dos and don\u2019ts for creating a cybersecurity training program.<\/p>\n","protected":false},"author":46,"featured_media":45228,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-45221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/45221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=45221"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/45221\/revisions"}],"predecessor-version":[{"id":56506,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/45221\/revisions\/56506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/45228"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=45221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=45221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=45221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}