Here at InfoSec Institute, we get pretty excited about events like National Cyber Security Awareness Month (NCSAM) and European Cyber Security Month (ECSM). Cybersecurity is our lifestyle, and Cyber Security Awareness Month is our opportunity to help you motivate your employees to care about security at your organization.
If you’re like most cybersecurity pros we know, the security awareness training manager hat is just one of many hanging in your server room. While you’ve been busy patching vulnerabilities and monitoring your networks, we’ve built out a series of free resources to help you kick off Cybersecurity Awareness Month like you’ve been planning for it all year.
The best part? We’ve released enough free resources to help you promote secure workplace habits all month long. Follow our roadmap to boost your employees’ security awareness in October and beyond.
Step 1: Warn End Users About Threats Lurking in Their Inboxes
Phishing: The security threat that just keeps swimming. Our new Marine Lowlife poster series will warn your users about the tactics hackers use to steal protected information over email. Every poster is short and to-the-point to keep messaging effective.
Hang a new poster in common areas every week to boost employee security awareness in a fun, digestible way. Posters include:
- Marine Lowlife: Swimming in Email?
- Common Phish (Moneywirus nigerius)
- Whaling Shark (Authoritium falsificus)
- Spearphish (Identificus antargetum)
- Clone Phish (Xeroxus imitatium)
Step 2: Share Actionable Ways to Keep Data Secure
Our five new infographics are like cybersecurity SparkNotes for your employees. They cover need-to-know awareness topics like business email compromise (BEC) to reinforce messages from your existing awareness training program.
- Spam or Phishing Email?: Teach your users the key differences between spam emails and phishing attacks
- How to Recognize a Malicious Attachment: Prevent your users from downloading malicious (Read more...)
*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Megan Sawle. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/dfT3-bZNlRs/