{"id":11450,"date":"2018-11-05T12:27:59","date_gmt":"2018-11-05T12:27:59","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11450"},"modified":"2018-11-05T12:27:59","modified_gmt":"2018-11-05T12:27:59","slug":"10-tips-for-teaching-cybersecurity-to-your-team","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/10-tips-for-teaching-cybersecurity-to-your-team\/","title":{"rendered":"10 tips for teaching cybersecurity to your team"},"content":{"rendered":"<p>Smart leaders know that their entire team needs to be well-educated on the importance and best practices of cybersecurity if they hope to protect their data. Here are 10 tips for effectively teaching cybersecurity to your entire team:<\/p>\n<ul>\n<li><strong>Explain the business benefits of secure data<\/strong> \u2013 each function, role and team member is responsible for protecting business data; make sure your team knows why this is important.<\/li>\n<li><strong>Use metaphors and analogies<\/strong> \u2013 make the conversation clear and relevant to the audience in a way they are familiar with.<\/li>\n<li><strong>Personalize trainings by department<\/strong> \u2013 providing an easy to consume, targeted training that regularly maps cybersecurity issues to someone&#8217;s role typically works best.<\/li>\n<li><strong>Highlight positive progress<\/strong> \u2013 give employees a progress report card that highlights positive improvements to get further \u201cbuy in\u201d to your company\u2019s policies and procedures.<\/li>\n<li><strong>Stick to the basics and practical aspects<\/strong> \u2013 avoid getting into the technical ways cybersecurity works; focus instead on what to look for in terms of suspicious activity.<\/li>\n<li><strong>Establish and communicate consistent processes<\/strong> \u2013 variations in processes are how people fall for unfamiliar messages; consistency helps avoid that pitfall.<\/li>\n<li><strong>Help employees understand the direct negative impact of poor security<\/strong> \u2013 convey why cybersecurity is important on a personal level as well as how compromised data can have a direct negative impact on individual lives.<\/li>\n<li><strong>Encourage the \u201csanity check\u201d<\/strong> \u2013 ask everyone to do the \u201csanity check\u201d: double-check the reply address before sending emails; double-check the web URL before you enter sensitive information; and log out of sensitive sites after your work is done there.<\/li>\n<li><strong>Simulate a hack<\/strong> \u2013 new services let you launch internal campaigns that mimic hacker techniques as a way to educate and evaluate your employees.<\/li>\n<li><strong>Establish a foundation of common cyber sense<\/strong> \u2013 cybersecurity is ultimately a team effort, but team leaders need to make sure everyone is educated on common tactics and basic cybersecurity hygiene.<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11450 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Self-boarding of corporate clients becoming more popular'>\n\t\t\t<div class='gallery-icon portrait'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/self-boarding-of-corporate-clients-becoming-more-popular\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2017\/11\/Self-boarding-of-corporate-clients-becoming-more-popular-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-6801\" loading=\"lazy\" srcset=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2017\/11\/Self-boarding-of-corporate-clients-becoming-more-popular-150x150.jpg 150w, https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2017\/11\/Self-boarding-of-corporate-clients-becoming-more-popular-100x100.jpg 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-6801'>\n\t\t\t\tSelf-boarding of corporate clients becoming more popular\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='The pros and cons of internet banks'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/the-pros-and-cons-of-internet-banks\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/03\/business-concept-with-copy-space-office-desk-table-with-pen-focus-and-analysis-chart-computer-notebook-cup-of-coffee-on-desk-vintage-tone-retro-filter-selective-focus_1418-536-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-8844\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-8844'>\n\t\t\t\tThe pros and cons of internet banks\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='The heads of Yandex, Tinkoff and Severstal discuss technological developments'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/the-heads-of-yandex-tinkoff-and-severstal-discuss-technological-developments\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/08\/the-heads-of-yandex-tinkoff-and-severstal-discuss-technological-developments-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-13442\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-13442'>\n\t\t\t\tThe heads of Yandex, Tinkoff and Severstal discuss technological developments\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Smart leaders know that their entire team needs to be well-educated on the importance and best practices of cybersecurity if they hope to protect their data. Here are 10 tips for effectively teaching cybersecurity to your entire team: Explain the business benefits of secure data \u2013 each function, role and team member is responsible for &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11520,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,193],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11450"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11450"}],"version-history":[{"count":3,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11450\/revisions"}],"predecessor-version":[{"id":11521,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11450\/revisions\/11521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11520"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}