Does your company ignore end-users when it comes to IT Security. The first reaction is normally to have the IT department implement the latest security software in the hope that it will prevent future security breaches of the corporate network. It’s also a fact that the risk is much higher from internal security breaches then external. Disgruntled employees can wreck more havoc then a wily hacker. It’s for this reason a comprehensive information security awareness-training program will benefit a company in the long run.

After a company agrees to have their staff trained on information security awareness we continue as follows:

  1. Your staff complete an online questionnaire  survey
  2. The staff will then be trained the following week noting the level of awareness from the survey
  3. A week after the training the staff will again complete a survey online to determine the effectiveness of the training
  4. They will all be subscribed to a monthly newsletter that highlights information security issues, trends and news. This will have the effect of keeping them in the loop and gently reminding them of what they should and shouldn’t do.
  5. A follow-up session will be conducted 6 months later to ensure that staff is practically implementing what they have learned about information security awareness.

 

The Need

There is insufficient understanding at Board level of Information Security issues, as per King II Report this is more important then ever. Most Information Security Training is geared towards IT professionals and is to technical for end-users.

The training will include the technical aspects of information security, brainteasers, humour, cartoons and video’s to interact with students.

Function Point Analysis

Audience: End-users in a corporate environment that uses computers and the Internet (email or Web) on a daily basis as part of their job function.

Benefits: Upon completion of this workshop the student will be able have engaged in interactive learning with immediate results. Quiz scores help measure effectiveness and there is an opportunity for questions and clarification by a subject matter expert.

Topics Covered

  1. Password Construction
  2. Password Management
  3. Internet Usage & Download limits
  4. Telephone Fraud
  5. E-mail Usage
  6. Viruses
  7. PC Security
  8. Software Licensing
  9. Software Backups
  10. Building Access
  11. Social Engineering
  12. Data Confidentiality
  13.   Identity Theft

Prerequisites: 3 years of computer usage

Duration: 1 day (from 9h00 – 16h00 with a 30 min lunch break and two 15 minute tea breaks)

Costs: R25, 000 per group of 20 people including materials on DVD.

Includes material, newsletter subscription, quiz (pre and post assessment)

 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.