{"id":2451,"date":"2017-05-02T08:00:08","date_gmt":"2017-05-02T08:00:08","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2451"},"modified":"2021-08-09T05:48:31","modified_gmt":"2021-08-09T09:48:31","slug":"educate-employees-cybersecurity","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2451","title":{"rendered":"Essential Network Security Tips: Provide Your Employees With Critical Network Security Training"},"content":{"rendered":"<p>Network Infiltration and <a class=\"zem_slink\" title=\"Data breach\" href=\"http:\/\/en.wikipedia.org\/wiki\/Data_breach\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Data Breaches<\/a> are normally blamed on the malicious outsider.\u00a0 However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment.<\/p>\n<p>That\u2019s why it\u2019s crucial to properly educate your employees about <a class=\"zem_slink\" title=\"Computer security\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_security\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Cybersecurity<\/a>.\u00a0 When you provide routine training as a preventative, not reactive, measure; and develop formal written policies\/procedures under the assumption that you will be infiltrated one day, you\u2019ll increase overall awareness. Some of the best things you should include while discussing Cybersecurity include\u2026<\/p>\n<p><span style=\"color: #800000;\"><strong>The 100% Secure Fairy Tale<\/strong><\/span><\/p>\n<p>Perhaps\u00a0the biggest misconceptions is that security provides all encompassed protection.\u00a0 If a malicious attachment or virus is sent to me, my organization\u2019s spam filter will catch it in time.\u00a0 This idea promotes reckless behavior in opening\/clicking on every item received.\u00a0 Security is a best effort approach to maintaining an organization\u2019s network infrastructure.\u00a0 The most protected network is only as secure as the weakest link.\u00a0 So, it\u2019s necessary to have more than just policy compliance, you must encourage cooperation among users to help protect against attacks.<\/p>\n<p>Also, remember users are only human, mistakes happen.\u00a0 Prevent public critique for failing to identify an attack prior to opening or clicking on the link.\u00a0 Rather, use the incident as a learning experience to increase awareness so that all employees can learn from the mistake.<\/p>\n<p><span style=\"color: #800000;\"><strong>Regularly Scheduled Employee Training Sessions<\/strong><\/span><\/p>\n<p><a class=\"zem_slink\" title=\"Turnover (employment)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Turnover_%28employment%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Staff turnover<\/a> and new hires occur throughout the year, so should Cybersecurity training.\u00a0 Part of every new employee orientation activities ought to include bringing them up to speed on security practices.\u00a0 Consider more engaging or interactive formats, like a Lunch &amp; Learn, Phishing Simulations, etc.\u00a0 Include recent media coverage of attacks against similar companies, as well as the many types of methodologies that were used to infiltrate the network, such as\u2026<\/p>\n<p><span style=\"color: #800000;\"><strong>Social Media Engineered Attacks<\/strong><\/span><\/p>\n<p>A growing trend focuses on our reliance to stay connected, and the power of Social Media to spread viruses onto otherwise secure networks.\u00a0 A study conducted by the <a href=\"http:\/\/www.pewinternet.org\/2016\/06\/22\/social-media-and-the-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pew Research Center<\/a>, 77% of workers reported using social media in the workplace, regardless of any written policy against it.<\/p>\n<p>The danger is that while a user scrolls through their news feed, they click links from multiple unknown sources, leading to a high rate of new vulnerabilities and access points the network engineers are struggling to protect team against.\u00a0 The toughest part for any user is in how to identify these suspicious links, because they almost never look dangerous.\u00a0 The best practice is to incorporate Social Media into your cybersecurity training.<\/p>\n<p><span style=\"color: #800000;\"><strong>What Can Employees Do?<\/strong><\/span><\/p>\n<p>Aside from the formalized written policies and training procedures, fundamental elements that need to be reiterated in any training procedure should include steps for employees to take if they recognize an attack.\u00a0 Things like physically unplugging their machine from the network, notifying their administrator of the suspicious activity, or if a company device is lost\/stolen, and having the emergency IT support number readily available for users to reach out to receive help.<\/p>\n<p><span style=\"color: #800000;\"><strong>Find a Balance Between Security &amp; Functionality<\/strong><\/span><\/p>\n<p>One of the biggest mistakes you can make when cultivating a secure network is creating complexities and\/or stringent policies. Security should make every effort to protect your organization\u2019s information.\u00a0 However, in this day of mobility and instant access, strict policies can hinder productivity.<\/p>\n<p>If something is too difficult or complicated to access, users will find less secure workarounds like personal email, USB drives, or using other colleague\u2019s credentials to bypass administrative restrictions.\u00a0 You can expect similar outcomes when enforcing strong password policies where employees need to change their passwords too frequently.\u00a0 The result?\u00a0 Likely post-it notes stuck to the monitor with the login details written down.<\/p>\n<p>To learn how to strike the perfect harmony between protecting and optimizing your organization, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Network Infiltration and Data Breaches are normally blamed on the malicious outsider.\u00a0 However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That\u2019s why it\u2019s crucial to properly educate your employees about Cybersecurity.\u00a0 When you provide routine training as a preventative, not reactive,&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[222,211,337,129,275,178,338],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Security Tips | Network Security Training for Employees | TSI<\/title>\n<meta name=\"description\" content=\"Improve your business&#039;s network defense by providing your employees with network security training. It&#039;s critical that you don&#039;t let your staff get complacent.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Security Tips | Network Security Training for Employees | TSI\" \/>\n<meta property=\"og:description\" content=\"Improve your business&#039;s network defense by providing your employees with network security training. It&#039;s critical that you don&#039;t let your staff get complacent.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2451\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-02T08:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T09:48:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451\",\"name\":\"Network Security Tips | Network Security Training for Employees | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png\",\"datePublished\":\"2017-05-02T08:00:08+00:00\",\"dateModified\":\"2021-08-09T09:48:31+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Improve your business's network defense by providing your employees with network security training. It's critical that you don't let your staff get complacent.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2451\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2451#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Essential Network Security Tips: Provide Your Employees With Critical Network Security Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Security Tips | Network Security Training for Employees | TSI","description":"Improve your business's network defense by providing your employees with network security training. It's critical that you don't let your staff get complacent.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Network Security Tips | Network Security Training for Employees | TSI","og_description":"Improve your business's network defense by providing your employees with network security training. It's critical that you don't let your staff get complacent.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2451","og_site_name":"TSI Support","article_published_time":"2017-05-02T08:00:08+00:00","article_modified_time":"2021-08-09T09:48:31+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2451","name":"Network Security Tips | Network Security Training for Employees | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png","datePublished":"2017-05-02T08:00:08+00:00","dateModified":"2021-08-09T09:48:31+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Improve your business's network defense by providing your employees with network security training. It's critical that you don't let your staff get complacent.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2451"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/05\/Site-Header.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2451#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Essential Network Security Tips: Provide Your Employees With Critical Network Security Training"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2451"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2451"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2451\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8561"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}