Online Data Security Training

Data breaches are expensive. Between 2014 and 2015 alone, the average cost of a data breach in the US grew 11% from $5.85 to $6.53 million. Lost business alone costs companies an average of $3.72 million. Given the frequency and high costs of data breaches, every organization needs to invest in a robust data security infrastructure. A common misunderstanding, however, is that data security is just about better technology. In fact, a growing number of data breaches are the result of human error.

"Employees can be seen as the Achilles’ heel of cybersecurity"
-Marc Van Zadelhoff, VP of IBM Security

"Employees can be seen as the Achilles’ heel of cybersecurity," explains Marc Van Zadelhoff, VP of IBM Security, "mistakes by those with access to a company’s systems are the catalyst for 95% of all incidents. It can be as simple as accidentally clicking on a malicious link or failing to question the authenticity of a phone call or banking website. Even organizations with the most robust, forward-thinking security strategies aren’t immune to one lapse in employee judgment."

Training employees on cybersecurity can address many of these issues efficiently and cost-effectively. It doesn't matter how good your anti-virus software is or what network protection you have if an employee opens a malicious attachment or accidentally forwards company secrets to the press.

But your data security training has to focus on the right things. Human error is often the result of human psychology (carelessness or gullibility) not lack of knowledge, so your approach must move beyond raising awareness to helping employees cultivate a mindset and shared sense of responsibility that empowers them to respond confidently to potential data security threats.

Learn more about what to look for in data security training in our white paper:

LawRoom's Checkpoint: Data Security and Privacy training provides employees with a thorough grounding in these data security essentials.

It instills in employees a sense of responsibility, teaches them to recognize potential attacks or risky behaviors, and shows them how to respond mindfully to cyberattacks or even just inappropriate requests for private information. Along the way, employees have the opportunity to apply what they've learned in a variety of realistic scenarios. Specific topics include phishing, pharming, social engineering, secure wireless connections, creating strong passwords, encryption, safe browsing, and watering hole attacks.

Training employees on data security shouldn't be an afterthought. It lays the foundation for a culture that takes security seriously.

Features

Rich Storytelling - Without concrete examples, the lessons of data security won't stick. Our course is full of stories told through video, animation, and case studies that bring alive the dangers of data breaches and how to prevent them. Our rich stories also recreate the emotional context of many of common data breach scenarios, preparing employees for the intellectual and emotional demands of high-pressure situations.

Immersive Interactions - Employees also need to have the opportunity to practice their skills in meaningful contexts. Immersive interactions that recreate situations employees actually face allow them to run through realistic situations, boosting recall and understanding.

Behavioral Modelling - Through our stories and interactions, we provide models of positive behavior, guiding employees as they prepare their own response to problematic situations. We encourage employees to anticipate common situations and plan their responses.

Compelling Infographics & Animations - Employees without a technical background may be intimidated by a data security course. We use simple, effective infographics, visuals, and animations to make complicated topics easily digestible.

Additional Resources - The core course is tightly focused to provide employees with a concise, effective experience. But some employees may be interested in exploring these issues further. To encourage these learners, we have included numerous optional readings fleshing out various topics with more examples and advice.

Outline

The Data Security Problem - Without concrete examples, the lessons of data security won't stick. Our course is full of stories told through video, animation, and case studies that bring alive the dangers of data breaches and how to prevent them. Our rich stories also recreate the emotional context of many of common data breach scenarios, preparing employees for the intellectual and emotional demands of high-pressure situations.

What We Need to Protect - Employees may know that credit card and social security numbers need to be protected, but often they do not understand the full range of data that could be considered sensitive. It's important to establish from the outset what constitutes sensitive and confidential data, that this data can be both physical and digital, and where they might find it. Employees learn to identify what data needs protection, including business intelligence and personal information.

Information Thieves and Their Tactics - Employees need to know who is after the data, what their motives are, and how they pursue sensitive data. The section places special emphasis on phishing attacks and phishing websites—helping protect employees from some of the most common forms of cyberattacks. Understanding these basic facts can help employees learn to recognize potential social engineering or data breaches.

Responding & Reporting - Although prevention is best, occasionally employees may be faced with a data breach, or confronted with a individual trying to infiltrate the organization. It's important that employees know both how to report data breaches and how to respond confidently and effectively to criminals. This section encourages employees to think about how they would respond to attempts at social engineering, asking them to contemplate potential pitfalls they may face and to pre-script their responses so that they're prepared for any situation. This innovative section approaches the problem of data security as one of motivation and attitudes, enabling employees to overcome common barriers to implementing best practices and common weak spots that social engineers may exploit.

Course Features

  • LMS Integration
  • Customizable
  • Accessibility
  • Translatable (Spanish, etc)
  • Compliance Updates
  • HTML5