Achieving Security/Privacy-Aware Behavior, Part II

On: January 2, 2013

THIS WHITE PAPER HAS BEEN COMBINED WITH TWO OTHERS AND CAN BE FOUND IN THE “3 STEPS TO AWARENESS SUCCESS” WHITE PAPER.

In Part II of this three-part series, we move from theory to practice as we examine the most important qualities of a good training solution. Understanding what makes good training will help as you evaluate the respective offerings of solution providers—or choose to build a program yourself. The success of your security and privacy awareness initiative will depend upon delivering a training and reinforcement solution that has been designed specifically to support and enable essential best practices and to reduce risk.

Not all awareness training or reinforcement solutions are up to these tasks. How will you separate the “wheat from the chaff” in an industry rife with confusing and often conflicting claims? These are the questions we’ll be addressing as we walk through the key attributes of a good awareness training program, and in the process, help you understand what works, why it works, and what misses the mark.

Share this Article

Related Articles

Download MediaPro's comprehensive guide to a winning security and privacy awareness training program.
White Paper: 3 Steps to Awareness Success
We address some of the most common misconceptions or lies we've heard about awareness training.
Dispelling 5 Lies About Awareness Training
What are some clues that employees are starting to practice security-aware behavior? If you see these five signs, you're doing something right!
5 Signs Your Cybersecurity Awareness Program Is Paying Off
50% of organizations attributed their single worst breach of the year to inadvertent human error and lack of good security awareness training.
50% of Worst Data Breaches Attributed to Human Error