Cybersecurity Training: How Effective is Training?

Cybersecurity Training: How Effective is Training?

Cybersecurity training for end users is one of the hottest topics of the last five years, with demand increasing year over year in both the public and private sectors.

If you Google “cybersecurity training” your results list will likely exceed twenty million different sources from a variety of organizations in the .edu, .gov, .org, and .com realms. Everyone has joined in on the trend, but how effective is training?

While there is no shortage of training materials and vendors, there is a shortage of quality training materials out there. Ones that will leave lasting impressions on your employees the way you can remember a great commercial or song for years. When was the last time a memory of your Information Technology security training randomly popped into your head? If you are like me, then this has never happened to you. This is why I think it is important to relook at how we structure training.  Here are some common tips that you receive in training:

  • Don’t click on suspicious links
  • Don’t open attachments from an untrusted source
  • Learn to recognize phishing scams
  • Make sure your antivirus software is up-to-date
  • Patch your systems

Everyone’s cybersecurity training covers these issues, yet the bad guys continue to successfully use basic tricks to fool end users. How is this possible?!

Employees know how to stop cyber attacks, but often fail to apply the knowledge they learned in training. Users fail to recall their training. It wasn’t memorable. It did not lead to a change in behaviors. We need to make training POP. Make training stay with users for more than five minutes. For several ideas on how to make your training stick, please check out https://www.dhs.gov/cybersecurity/tips_for_training.  

The other reason employees may make bad decisions is because there is a lack of enforcing standards. How often do users take into consideration that there could be a repercussion for what they are about to do with their keyboard or mouse? How many times a day do your employees stick a finger in an electrical outlet? Hmmm, shocking. Literally. Could it possibly be because they know exactly what would happen?

Restructuring the cybersecurity training format to incorporate the usual training checklist, but also emphasizing the enforcement of standards and including some entertainment, would help employees gain a lasting understanding of cybersecurity.  That way, training will resonate in employees’ minds for longer than five minutes after training.

Contributors

* Arc Aspicio |

Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. As a rapidly growing company, Arc Aspicio has a bold strategy for 2016-2018 that drives growth through new capabilities in strategy, design, human capital, data analytics, information sharing, cybersecurity, and strategic communications. The company is known for a strong, collaborative culture that values gratitude – for its clients and its great team. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Lynn Ann Casey / Chief Executive Officer
info@arcaspicio.com
703.465.2060

Mr. Roboto: Your Newest Coworker

Mr. Roboto: Your Newest Coworker

Could your next cubemate be a robot? Elon Musk, the Tesla and SpaceX founder, is building our future coworkers and forming a world filled with Artificial Intelligence (AI) that could “beat us in just about everything,” including our jobs. As Musk attempts to create a real-life iRobot, many advantages and a possible partnership arise with this future. How can the Government and Homeland Security prepare and welcome new technological advancements?

Data + Strategy: Using Data to Inform Agency Strategy

Data + Strategy: Using Data to Inform Agency Strategy

Understanding the types of data available, gaining access to the right data, and making sense of data are daunting tasks for most organizations as they develop a strategy to meet mission demands and enterprise-wide goals. Data is especially challenging for the Government, yet provides the opportunity for insight for leaders as they strategically move their agencies forward.

Workplace Morale is Going to the Dogs… Literally!

Workplace Morale is Going to the Dogs… Literally!

There are few greater feelings than a dog’s unconditional love. And some are finding that a dog’s love can help combat stress at work. Secretary Zinke of the Interior Department announced his intent for "Doggy Days" where he encouraged employees to bring their canine companions to work on designated days. More than 80 dogs arrived for first event and the overjoyed employees immediately scheduled the next.

Accelerating FITARA Compliance: Five Steps That Leaders Can Take Today

Accelerating FITARA Compliance: Five Steps That Leaders Can Take Today

Implementing change is not always easy, but it is always necessary. Federal agencies have been working to transform how they acquire and manage Federal information technology (IT). The Federal Information Technology Acquisition Reform Act (FITARA) in December 2014 has increased visibility into this transformation.Although FITARA enhances the authority and accountability of Chief Information Officers (CIOs) in reviewing and approving major IT investment projects, CIOs continue to look for new ways to implement best practices at their agencies.

Combating the Rise of Transnational Criminal Organizations

Combating the Rise of Transnational Criminal Organizations

Crime, corruption, and violence – particularly involving drug, human, and weapons trafficking – continue to increase at an alarming rate in the U.S. Transnational Criminal Organizations (TCOs) are a critical part of this trend and pose a serious and growing threat to homeland security – at our borders and beyond.U.S. Customs and Border Protection (CBP) is at the tip of the spear to combat TCOs. With the context that the first goal in their Vision and Strategy 2020 Strategic Plan is Counter Terrorism and Transnational Crime, CBP is focusing on disrupting TCOs responsible for the cross-border trafficking of illegal drugs, humans, and guns.

Design Thinking: Putting the Citizen at the Heart of Lasting Change

Design Thinking: Putting the Citizen at the Heart of Lasting Change

For the past few decades, there has been a growing increase in the digital channels available to network with the Federal government. These channels have made it easier for the public to interact and elicit responses from elected officials.These growing interactions have increased expectations for Government to be more transparent and collaborative. From the Department of Homeland Security (DHS) to the Department of State (DOS), Design Thinking transformations have begun to develop and modernize programs to be more human-centered. Agencies and programs beholden to serve the public good should logically adopt a problem-solving mindset that places the individual at the heart of any lasting changes.

Using Behavioral Science to Improve Mission Outcomes

Using Behavioral Science to Improve Mission Outcomes

Although behavioral science has been studied and applied within academia for decades, recently the concept has emerged everywhere – from Silicon Valley tech giants such as Google and Uber, to various Government agencies including the Department of Education, the Department of Defense, and the Department of Agriculture.But defining and applying such a broad and sometimes-nebulous discipline can prove difficult. What exactly is behavioral science? How can the Government use the concepts and lessons learned effectively?

Crowdsourcing to Improve Security

Crowdsourcing to Improve Security

Many of us are familiar with the idea of crowdsourcing. Corporations and the Government both use crowdsourcing to generate data, raise awareness campaigns, and produce ideas. So, what if we used crowdsourcing to enhance our security and bridge communication gaps between the Government and American citizens at the same time?

Homeland Security Managers = Innovative Leaders

Homeland Security Managers = Innovative Leaders

The search for and implementation of innovative methods to protect the homeland should play an important role in homeland security managers’ approach to how they guide their organizations. Citizens expect government leaders to propose and implement organizational, acquisition, and personnel management practices that enhance our nation’s ability to prepare for and mitigate potential threats. They expect these to make them safer and the nation more secure.