{"id":133677,"date":"2020-05-25T18:16:49","date_gmt":"2020-05-25T16:16:49","guid":{"rendered":"https:\/\/gamestrategies.io\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/"},"modified":"2024-11-01T17:17:08","modified_gmt":"2024-11-01T16:17:08","slug":"how-to-use-training-to-tackle-company-cybersecurity","status":"publish","type":"post","link":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/","title":{"rendered":"How to use training to tackle company cybersecurity"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The idea that the responsibility for computer security falls squarely on the shoulders of a company\u2019s <a href=\"https:\/\/www.game-learn.com\/en\/resources\/blog\/what-is-the-cybersecurity-framework-for-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">IT department<\/a>, or on its top manager or CTO, is commonplace. On its face, it makes sense &#8212; these people are the ones with the technical know-how to counter attacks and maintain security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, in practice, while these roles may be able to contain attacks, they don\u2019t have the necessary resources or reach to prevent them. This falls on everyone&#8217;s shoulders equally. Everyone needs to be on the same page and working together.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All businesses need to be ready to take on any cyberattack that may come their way. The threat is constant and all organizations need to know how to counter it. Attacks can affect companies of any size and happen anywhere in the world. For example, Telefonica was hit in 2017, and it affected the worldwide market; but it can also hit more local companies like PRISA or Everis in Spain, for example, which were attacked with ransomware and had all their files held hostage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At <a href=\"http:\/\/www.formadoresit.es\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Formadores IT<\/a>, we understand how important it is to give Training and HR departments the tools and know-how to implement a <a href=\"https:\/\/www.game-learn.com\/en\/resources\/blog\/a-brief-guide-to-improve-your-companys-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">comprehensive prevention plan<\/a>. Ours, for example, works in four phases:<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00a01. <\/span><span style=\"font-weight: 400;\">Evaluation and measurement<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In the initial phase, the focus should be on measuring the organization\u2019s risk of attack. This means drawing up a plan that\u2019s agreed upon by the IT and Training departments, as well as approved by Management, whose primary interest is regulatory compliance. This way, everyone working together can construct an in-depth assessment of the status of the organization&#8217;s computer security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To do this, a few initial evaluations must be carried out taking the most common risks into account. Such evaluations include:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A simulation of phishing or ransomware attacks directed at a random group of employees, to see how they respond.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A simulation of vishing attacks (phishing via phone) directed at least ten people.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A simulation of attacks using randomly-distributed USB drives, to see if anyone plugs them in.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">\u00a02. <\/span><span style=\"font-weight: 400;\">Training and awareness\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The next step involves training employees to correct any vulnerabilities detected in the previous phase\u2019s simulations. To do this, we can organize online training sessions of roughly 2 hours each for groups of 20 to 25 people, with the digital option being the least expensive and most efficient one. The goal of these conferences should be to share basic knowledge that will help them detect and prevent cyberattacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">3. Active training<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">This phase consists of organizing regular training sessions for users to make sure they\u2019re able to actively detect attacks. This phase will:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be activated and assigned at random.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be targeted for specific departments, roles, or users.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Teach how to correct errors. In the case of mistakes or oversights, students will learn what they should have done and what clues should have tipped them off that a cyberattack was taking place.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Learning to stay safe on various devices and social networks is a huge step in the right direction, and it\u2019s much easier with a <a href=\"https:\/\/www.game-learn.com\/en\/resources\/blog\/why-crypto-improves-your-companys-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">dynamic serious game such as Crypto<\/a>. This game helps students identify common mistakes and bad practices that unfortunately happen in many organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The game uses compelling storytelling to get students up close and personal with various cybersecurity threats, which gives them the know-how to deal with them more naturally. This way, through an engaging and fun video game, you can have students delve into key security aspects such as password management, risks on social media, risks on smartphones, risks on public Wi-Fi networks, identifying viruses or malware, risks in the workplace, the safe use of email or social engineering, and more.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">4. Analysis and correction of problems<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To finish, it\u2019s a good idea to prepare a final report covering the following goals:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Have a realistic and comprehensive perspective of the different areas of cybersecurity today.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Understand what goes into security, and have a thorough discussion about the realities of your vulnerabilities as well as which policies and procedures you should adopt.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Understand and incorporate the basic concepts and technologies that define IT and computer security.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Learn what\u2019s new in the world of cybersecurity as well as what new technologies are on the cutting edge<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Cyberattacks are a reality we all have to deal with, and unfortunately, they aren\u2019t going away anytime soon. Learn how to use training to your advantage to ward off any lurking dangers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The idea that the responsibility for computer security falls squarely on the shoulders of a company\u2019s IT department, or on its top manager or CTO, is commonplace. On its face, it makes sense &#8212; these people are the ones with the technical know-how to counter attacks and maintain security. However, in practice, while these roles [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":127975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[157],"tags":[],"class_list":["post-133677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to use training to tackle company cybersecurity<\/title>\n<meta name=\"description\" content=\"Cyberattacks are the order of the day, protect your company by training your employees in cybersecurity so they can prevent any problems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to use training to tackle company cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks are the order of the day, protect your company by training your employees in cybersecurity so they can prevent any problems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Game Strategies\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T16:16:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T16:17:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"852\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gamelearn Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gamelearn Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to use training to tackle company cybersecurity","description":"Cyberattacks are the order of the day, protect your company by training your employees in cybersecurity so they can prevent any problems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"How to use training to tackle company cybersecurity","og_description":"Cyberattacks are the order of the day, protect your company by training your employees in cybersecurity so they can prevent any problems.","og_url":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/","og_site_name":"Game Strategies","article_published_time":"2020-05-25T16:16:49+00:00","article_modified_time":"2024-11-01T16:17:08+00:00","og_image":[{"width":1280,"height":852,"url":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/ciberseguridad.jpg","type":"image\/jpeg"}],"author":"Gamelearn Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gamelearn Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/","url":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/","name":"How to use training to tackle company cybersecurity","isPartOf":{"@id":"https:\/\/gamestrategies.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/ciberseguridad.jpg","datePublished":"2020-05-25T16:16:49+00:00","dateModified":"2024-11-01T16:17:08+00:00","author":{"@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/ba8bb23a0fcb9db323e5491ea255ae7a"},"description":"Cyberattacks are the order of the day, protect your company by training your employees in cybersecurity so they can prevent any problems.","breadcrumb":{"@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/#primaryimage","url":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/ciberseguridad.jpg","contentUrl":"https:\/\/gamestrategies.io\/wp-content\/uploads\/2024\/09\/ciberseguridad.jpg","width":1280,"height":852},{"@type":"BreadcrumbList","@id":"https:\/\/gamestrategies.io\/en\/blog\/how-to-use-training-to-tackle-company-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/gamestrategies.io\/en\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/gamestrategies.io\/en\/blog\/category\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"How to use training to tackle company cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/gamestrategies.io\/en\/#website","url":"https:\/\/gamestrategies.io\/en\/","name":"Game Strategies","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gamestrategies.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/ba8bb23a0fcb9db323e5491ea255ae7a","name":"Gamelearn Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gamestrategies.io\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5fc7a4184272ac538ad3a7175396848de55d3c6c165113c5acded63cd953840?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5fc7a4184272ac538ad3a7175396848de55d3c6c165113c5acded63cd953840?s=96&d=mm&r=g","caption":"Gamelearn Team"},"url":"https:\/\/gamestrategies.io\/en\/blog\/author\/gamelearn\/"}]}},"_links":{"self":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts\/133677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/comments?post=133677"}],"version-history":[{"count":0,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/posts\/133677\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/media\/127975"}],"wp:attachment":[{"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/media?parent=133677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/categories?post=133677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gamestrategies.io\/en\/wp-json\/wp\/v2\/tags?post=133677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}