Copyright © CampusClarity, a service of LawRoom All rights Reserved.

"Employees can be seen as the Achilles’ heel of cybersecurity," explains Marc Van Zadelhoff, VP of IBM Security, "mistakes by those with access to a company’s systems are the catalyst for 95% of all incidents. It can be as simple as accidentally clicking on a malicious link or failing to question the authenticity of a phone call or banking website. Even organizations with the most robust, forward-thinking security strategies aren’t immune to one lapse in employee judgment."

"Employees can be seen as the Achilles’ heel of cybersecurity"
-Marc Van Zadelhoff, VP of IBM Security

Training employees on cybersecurity can address many of these issues efficiently and cost-effectively. It doesn't matter how good your anti-virus software is or what network protection you have if an employee opens a malicious attachment or accidentally forwards company secrets to the press.

But your data security training has to focus on the right things. Human error is often the result of human psychology (carelessness or gullibility) not lack of knowledge, so your approach must move beyond raising awareness to helping employees cultivate a mindset and shared sense of responsibility that empowers them to respond confidently to potential data security threats.

Learn more about what to look for in data security training in our white paper: Investing in the Human Firewall

LawRoom's Checkpoint: Data Security and Privacy training provides employees with a thorough grounding in these data security essentials.

It instills in employees a sense of responsibility, teaches them to recognize potential attacks or risky behaviors, and shows them how to respond mindfully to cyberattacks or even just inappropriate requests for private information. Along the way, employees have the opportunity to apply what they've learned in a variety of realistic scenarios. Specific topics include phishing, pharming, social engineering, secure wireless connections, creating strong passwords, encryption, safe browsing, and watering hole attacks.

Training employees on data security shouldn't be an afterthought. It lays the foundation for a culture that takes security seriously.

  • LMS Integration
  • Customizable
  • Accessibility
  • Translatable (Spanish, etc)
  • Compliance Updates
  • HTML5

COURSE FEATURES

Immersive Interactions - Employees also need to have the opportunity to practice their skills in meaningful contexts. Immersive interactions that recreate situations employees actually face allow them to run through realistic situations, boosting recall and understanding.

Online Data Security Training

Rich Storytelling - Without concrete examples, the lessons of data security won't stick. Our course is full of stories told through video, animation, and case studies that bring alive the dangers of data breaches and how to prevent them. Our rich stories also recreate the emotional context of many of common data breach scenarios, preparing employees for the intellectual and emotional demands of high-pressure situations.

Compelling Infographics & Animations - Employees without a technical background may be intimidated by a data security course. We use simple, effective infographics, visuals, and animations to make complicated topics easily digestible.

Behavioral Modelling - Through our stories and interactions, we provide models of positive behavior, guiding employees as they prepare their own response to problematic situations. We encourage employees to anticipate common situations and plan their responses.

Additional Resources - The core course is tightly focused to provide employees with a concise, effective experience. But some employees may be interested in exploring these issues further. To encourage these learners, we have included numerous optional readings fleshing out various topics with more examples and advice.

FEATURES

Data breaches are expensive. Between 2014 and 2015 alone, the average cost of a data breach in the US grew 11% from $5.85 to $6.53 million. Lost business alone cost companies an average of $3.72 million. Given the frequency and high costs of data breaches, every organization needs to invest in a robust data security infrastructure. A common misunderstanding, however, is that a data security is just about better technology. In fact, a growing number of data breaches are the result of human error.

LEARN MORE

"Employees can be seen as the Achilles’ heel of cybersecurity," explains Marc Van Zadelhoff, VP of IBM Security, "mistakes by those with access to a company’s systems are the catalyst for 95% of all incidents. It can be as simple as accidentally clicking on a malicious link or failing to question the authenticity of a phone call or banking website. Even organizations with the most robust, forward-thinking security strategies aren’t immune to one lapse in employee judgment."

"Employees can be seen as the Achilles’ heel of cybersecurity"
-Marc Van Zadelhoff, VP of IBM Security

Training employees on cybersecurity can address many of these issues efficiently and cost-effectively. It doesn't matter how good your anti-virus software is or what network protection you have if an employee opens a malicious attachment or accidentally forwards company secrets to the press.

But your data security training has to focus on the right things. Human error is often the result of human psychology (carelessness or gullibility) not lack of knowledge,

so your approach must move beyond raising awareness to helping employees cultivate a mindset and shared sense of responsibility that empowers them to respond confidently to potential data security threats.

Learn more about what to look for in data security training in our white paper: Investing in the Human Firewall

LawRoom's Checkpoint: Data Security and Privacy training provides employees with a thorough grounding in these data security essentials.

It instills in employees a sense of responsibility, teaches them to recognize potential attacks or risky behaviors, and shows them how to respond mindfully to cyberattacks or even just inappropriate requests for private information. Along the way, employees have the opportunity to apply what they've learned in a variety of realistic scenarios. Specific topics include phishing, pharming, social engineering, secure wireless connections, creating strong passwords, encryption, safe browsing, and watering hole attacks.

Training employees on data security shouldn't be an afterthought. It lays the foundation for a culture that takes security seriously.