
How America’s Car-Mart Stays One Step Ahead of Hackers With SecurityIQ
America’s Car-Mart is the largest publicly held automotive retailer in the United States. With the help of over 1,000 employees, the company operates 140 automotive dealerships and maintains over 71,000 active client accounts.
To help secure the company against security threats like phishing emails and keep sensitive data safe, Car-Mart Security Engineer Michael Prestien started shopping around for a workforce security awareness training platform to fit his team’s needs. We sat down with Michael to discuss why he chose SecurityIQ as Car-Mart’s awareness training platform and learn how his first few training campaigns have gone since implementing the program earlier this year.
Why Did Car-Mart Decide to Launch an Security Awareness Training Program?
Our leadership team really pushed for the program. After seeing so many stories in the news about phishing attacks and data breaches, we wanted to be proactive and train our employees how to spot common security threats like phishing and social engineering.
We have an internal training team, but decided to pursue an external solution to save time and resources. It allowed us to launch our program much quicker and saved me from having to create the training material myself.
Why Did You Select SecurityIQ as Car-Mart’s Awareness Training Program?
I went through demos with about six different training programs before picking SecurityIQ, and even tried out a few free phishing simulators. The free simulators were nice, but required a lot of work on my end to make them work as intended. I didn’t have the time to dedicate to that process, and I also needed to find a program that’s easy to manage.
Eventually, I’m going to pass program management onto our compliance department. They aren’t as technically savvy as I am, so it’s important the program is easy to manage. That’s a big reason why (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/lrMa2vO_lO0/