{"id":5500,"date":"2021-09-07T16:26:27","date_gmt":"2021-09-07T16:26:27","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5500"},"modified":"2021-09-07T16:27:22","modified_gmt":"2021-09-07T16:27:22","slug":"information-security-awareness","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5500","title":{"rendered":"Information Security Awareness"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5500\" class=\"elementor elementor-5500\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2369ea53 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2369ea53\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1cafbbfc ot-flex-column-vertical\" data-id=\"1cafbbfc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6a2b3de5 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6a2b3de5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-586c7260 ot-flex-column-vertical\" data-id=\"586c7260\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-79b3891a elementor-widget elementor-widget-text-editor\" data-id=\"79b3891a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5><strong>You have the best security your budget allows, but why is your network still being compromised?<\/strong><\/h5><p>All it takes is one click by an employee to infect a work station, allow hackers in,\u00a0cause a ransomware attack, an expensive data breach or worse, a cyber-attack.<\/p><p>By increasing the awareness of users within your organization, DataSecure can\u00a0reduce the risk of a data breach or data loss, and we show this through\u00a0measurement and reporting before and after awareness training.<\/p><p>Your current security layers do not sufficiently cover your weakest link: your\u00a0employees.<\/p><p>Nine out of every ten malware attacks are propagated through human interaction.\u00a0Training your users to be security aware will provide them with the skills to flag\u00a0suspicious behavior such as phishing emails or social engineering attempts. When\u00a0you ensure your employees understand the dangers they face, you can greatly\u00a0mitigate the risks your organization faces.<\/p><p>Traditional once-a-year security awareness training won\u2019t cut it any more. Attackers\u00a0bypass your technology and target your employees who are frequently exposed to\u00a0sophisticated phishing attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-22803a1e ot-flex-column-vertical\" data-id=\"22803a1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a1d8c92 elementor-widget elementor-widget-image\" data-id=\"6a1d8c92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"595\" height=\"595\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Security-Awareness-Office.png\" class=\"attachment-large size-large wp-image-2264\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Security-Awareness-Office.png 595w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Security-Awareness-Office-300x300.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Security-Awareness-Office-150x150.png 150w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c9dbbb9 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c9dbbb9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-45f83b65 ot-flex-column-vertical\" data-id=\"45f83b65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3c870752 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"3c870752\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-32fa9b52 ot-flex-column-vertical\" data-id=\"32fa9b52\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6492b759 elementor-widget elementor-widget-text-editor\" data-id=\"6492b759\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><span style=\"color: #ffffff;\"><strong>Training that is customizable to fit your organization and to have an impact.<\/strong><\/span><\/h4><p>It is critical that the training and implementation fits the organization. We can\u00a0customize who is trained and how they are trained by categorizing your employees\u00a0into groups based on their level of risk to the business. We also focus on specific\u00a0topics that are more relevant to your industry, and more specific to your\u00a0organization.<\/p><p>We specialize in making sure that employees understand the mechanisms of spam,\u00a0phishing, spear phishing, malware, ransomware and social engineering, and are able\u00a0to apply this knowledge to their day-to-day job.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eb8b24c ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5eb8b24c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-137dcd73 ot-flex-column-vertical\" data-id=\"137dcd73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-418419c8 elementor-widget elementor-widget-image\" data-id=\"418419c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"885\" height=\"600\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/learning.png\" class=\"attachment-large size-large wp-image-2265\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/learning.png 885w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/learning-300x203.png 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/learning-768x521.png 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/learning-720x488.png 720w\" sizes=\"(max-width: 885px) 100vw, 885px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2bd9288b ot-flex-column-vertical\" data-id=\"2bd9288b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2bcb4919 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"2bcb4919\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-b06f394 ot-flex-column-vertical\" data-id=\"b06f394\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fd725f2 elementor-widget elementor-widget-text-editor\" data-id=\"7fd725f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Continuous Education Yields Measurable Results<\/strong><\/h4><p>Our partner Wombat Security Technologies can perform a continuous cycle of\u00a0assessment, education, reinforcement, and measurement which maximizes learning\u00a0and lengthens retention. Customers have experienced up to a 90% reduction in\u00a0successful external phishing attacks and malware infections using the following four-\u00a0step approach to security awareness and training:<\/p><p>Assess \u2013 An important first step to a comprehensive security awareness and\u00a0training program is to evaluate your employees\u2019 knowledge and your\u00a0organization\u2019s susceptibility. Wombat offers customizable assessments and\u00a0simulated attacks (e.g., mock phishing emails), as well as Teachable Moments\u00a0that provide tips and practical advice for employees who fall for mock\u00a0phishing, smishing, and USB attacks. These brief exercises explain the dangers\u00a0of actual attacks and help motivate employees to participate in follow-up\u00a0training.<\/p><p>Educate \u2013 Wombat\u2019s interactive training modules are the key to educating\u00a0your employees about security threats in the workplace and beyond.<\/p><p>These\u00a010- to 15-minute modules give users the opportunity to understand the types\u00a0of risks they might encounter and recognize how their actions can have a\u00a0positive impact on the safety and security of corporate and personal assets.\u00a0Its\u00a0Auto-Enrollment feature allows you to automatically assign training to\u00a0employees who fall for simulated phishing attacks and those users who don\u2019t\u00a0exhibit a desired level of proficiency on Predefined CyberStrength\u00a0assessments.<\/p><p>Reinforce \u2013 Wombat\u2019s Security Awareness Materials \u2014 a library of images,\u00a0posters, articles, and gifts \u2014 help you emphasize best practices and positive\u00a0behaviors within your workplace. By making these messages more visible and\u00a0recognizable, you reinforce your training and help employees retain their\u00a0knowledge.<\/p><p>Measure \u2013 The most effective training program is one that is flexible enough\u00a0to adapt and change according to your needs. That\u2019s why measurement is so\u00a0important. Wombat\u2019s approach allows you to gather powerful analytics about\u00a0your organization\u2019s strengths and weaknesses, evaluate results, and plan\u00a0future training accordingly prior to repeating the<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>You have the best security your budget allows, but why is your network still being compromised? All it takes is one click by an employee to infect a work station, allow hackers in,\u00a0cause a ransomware attack, an expensive data breach or worse, a cyber-attack. By increasing the awareness of users within your organization, DataSecure can\u00a0reduce [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5500","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5500"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5500\/revisions"}],"predecessor-version":[{"id":5504,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5500\/revisions\/5504"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}