How Arkansas Securities Department Created a Culture of Increased Security Awareness with SecurityIQ

The Arkansas Securities Department in Little Rock, Arkansas, is a small agency with a big responsibility. Its 40 employees are charged with implementing and overseeing a variety of important financial service regulations in the State of Arkansas, including the Arkansas Securities Act, Arkansas Fair Mortgage Lending Act and the Arkansas Money Services Act.

IT Application Systems Supervisor Tyler Pate joined the Arkansas Securities Department team last year. As a former IT Security Analyst for the Arkansas Scholarship Lottery, Tyler knew increasing workforce security awareness would improve the Department’s overall security strategy.

“We started looking around for security awareness training tools to continuously educate our team about security threats like phishing and malware. Our team at Arkansas Securities Department already had a good foundational understanding of IT and security, but we wanted to bump it up a notch or two,” said Tyler. “We decided to demo SecurityIQ using their free trial offer and see if the platform fit our needs. It did — we liked what we saw and launched our first few training campaigns in late 2017.”

Engaging Security Awareness Training That Drives Results

Before launching his first training campaign, Tyler took advantage of his small team size to announce the Department’s new awareness training initiative face to face. “With the support of management, we held a kick-off meeting during an Arkansas Securities Department meeting where I shared screenshots of the training with the team,” said Tyler. “I showed them what the SecurityIQ training notifications looked like so they knew what to expect, and also walked them through a few modules.”  

Tyler knew the SecurityIQ model fit the team after launching his first few phishing tests. “We have a really diverse workforce,” said Tyler. “What’s interesting is we found everyone on the team enjoyed the training and (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: