Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management
    • Small Business

    How to Provide Security and Compliance Training to Diverse Workforces

    Written by

    Barry Cooper
    Published June 1, 2010
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Your IT security team has done due diligence in hardening your organization’s IT infrastructure to align it with the latest regulations. You’ve deployed state-of-the-art Data Loss Prevention (DLP) and intrusion prevention systems (IPSes), firewalls, and antivirus and antimalware solutions. And you have personally overseen all recent compliance audits. You think you can now rest easy; after all, you’ve raised your organization’s security and compliance posture to the highest level possible.

      But, suddenly, your world is turned upside down after reading a letter from a credit card company informing you that it believes your organization is the victim of a breach that has compromised payment card information on millions of your customers. You wonder, “How could this be? We’ve taken every precaution possible!”

      Several months later, a time-consuming and expensive forensic audit reveals that cyber-criminals penetrated your network using an employee’s user name and password. It’s possible that the criminals obtained the password because the employee opened up a document rigged to take advantage of a zero-day exploit.

      In this case, it took only one oblivious employee-who had no understanding of how important it is to avoid opening attachments from unknown and unverified sources-to reduce your IT security infrastructure to the equivalent of an unlocked door with a red blinking sign that reads, “Come on in and take our cardholder data!”

      To prevent data breaches and security incidents, organizations operating within regulated environments spend years continually hardening their IT systems and controlling access to information so that employees, customers and business partners only have access to what they need to do their jobs. However, with all of the effort put into information security strategies, one step is often overlooked: training.

      Hardening your IT systems without training employees leaves a gaping security hole. Training employees on the latest standards and best practices on how to integrate information security and compliance-focused habits into their everyday functions (and how to recognize suspicious behavior) are all critical components that should be a part of any information security strategy.

      Unfortunately, training is expensive and resource-intensive. It is no simple task to create a training curriculum, prepare materials (and keep them updated), and then ensure that the training is available around-the-clock to meet the schedules of employees who may be located throughout the world.

      Cost-Effective Training Options

      Cost-effective training options

      Fortunately for regulated organizations, a variety of cost-effective training options are available that can be used to teach every employee how to reduce risk by bringing security best practices into their everyday work environment. These flexible training products and services can teach doctors, for example, that opening attachments from unknown and unverified sources is high-risk behavior. Or they can teach fast-food franchise managers that it’s easy for a hacker to guess that the password “burger_and_fries” could grant access to a corporate intranet. Or these training products and services can teach hospital employees that just because a file is stamped with the initials “HIPAA” (the acronym for the Health Insurance Portability and Accountability Act) doesn’t mean it’s secure.

      Benefits of effective training programs

      Choosing a security and compliance training vendor and program for your workforce may seem like a difficult task. The good news is that there are countless numbers of online and on-premises options available. An effective training program needs to address the specific requirements of your organization.

      When evaluating a vendor and a training program, make sure that, at a minimum, they can provide your employees with these eight benefits:

      Benefit No. 1: Basic training in major industry regulations such as the Payment Card Industry Data Security Standard (PCI DSS), HIPAA and other compliance-specific courses

      Benefit No. 2: On-demand, Internet-based options that can extend training to a distributed and diverse workforce on a 24/7 basis

      Benefit No. 3: Compatibility with your organization’s current learning management system (LMS) to ensure that it is easy to integrate the training program into your organization

      Benefit No. 4: A metrics feature that enables your organization to track participation, course completion and knowledge retention

      Benefit No. 5: Real-world training delivered through courses developed by subject matter experts who have completed compliance and security assessments within your industry

      Benefit No. 6: Interactive, media-rich content and curriculums that encourage student participation and knowledge retention

      Benefit No. 7: Constantly updated best practices, security and compliance knowledge

      Benefit No. 8: Flexible pricing options that respond to your budgetary requirements

      Training is an important and vital component of any information security strategy. Make sure that you implement an effective training program that fits the needs of your organization. Your reputation, continued customer loyalty and even the organization’s financial position can be negatively impacted by a data breach that proper training could have prevented.

      Barry Cooper is Vice President of Training Services at FishNet Security. Barry has over 20 years of experience in IT. He has designed and provided training for technical courses for over 15 years. He has significant expertise in systems analysis, programming, and network engineering. Barry is responsible for security education services, operations, management and leadership of the FishNet Security’s training organizations. In addition, he manages vendor, security and distance learning product development.

      Barry has over 70 high-level security and technical certifications including CISSP, JNCI (Juniper instructor), CCSI (CheckPoint instructor) and CTT+ (Certified Technical Trainer). He is a member of the American Society for Training and Development (ASTD) and the United States Distance Learning Association. Barry earned a Bachelor’s degree in Organizational Leadership from Calvary Bible College and is currently pursuing a Master’s degree in Education. He can be reached at barry.cooper@fishnetsecurity.com.

      Barry Cooper
      Barry Cooper
      Barry Cooper is Vice President of Training Services at FishNet Security. Barry has over 20 years of experience in IT. He has designed and provided training for technical courses for over 15 years. He has significant expertise in systems analysis, programming, and network engineering. Barry is responsible for security education services, operations, management and leadership of the FishNet Security's training organizations. In addition, he manages vendor, security and distance learning product development. Barry has over 70 high-level security and technical certifications including CISSP, JNCI (Juniper instructor), CCSI (CheckPoint instructor) and CTT+ (Certified Technical Trainer). He is a member of the American Society for Training and Development (ASTD) and the United States Distance Learning Association. He can be reached at barry.cooper@fishnetsecurity.com.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×