Security Think Tank: New trends and drivers in cyber security training

Self-paced, interactive, bite-sized learning is becoming the optimum path for cyber security training in the workplace, says John Tolbert of KuppingerCole

John Tolbert

By

Published: 16 Feb 2023

Cyber security training is a vital security strategy for many enterprises across the world. Such training has been established at large companies and government organisations for many years now. Small to medium size businesses have increasingly seen the value in contracting in training to help users avoid common security issues. Cyber security training is also required for regulatory and standards regimes such as ISO 27001.

Phishing and other threats

Phishing remains one of the biggest threats that everyone faces. Fraudsters and cyber criminals have different and variable tactics for phishing campaigns. These bad actors have and will continue to adapt to increasingly prepared workforces. Gaining access to user accounts is almost always a motive. Spear-phishing is the more highly targeted variant, wherein executives and administrators are the intended victims. Email used to the be primary vector for phishing. It still is a highly used channel, but cybercriminals now also use SMS text messages, other messaging apps, social media messaging, and phone calls (sometimes called vishing, for voice phishing). Enterprise cyber security training programs have traditionally focused on the email vector, but they also need to take into account the variety of attack channels to show users what kinds of phishing content may appear in all these different communications platforms.

But phishing is not the only subject for cyber security training. Other subjects that users need periodic reminders about include deterring tailgating into facilities (bypassing physical access controls), password management, how to handle removable media, using only sanctioned cloud services, not sending company data and personal information over unapproved channels such as personal email, not revealing company information on social media, avoiding using public wireless networks, using VPNs, and so forth. 

Most training of this nature is designed to raise user awareness to prevent user errors that lead to cyber security incidents. But employees need to know what to do when something bad happens. What should they do when they receive a phishing email? What should they do when they believe that confidential information has been compromised? What should they do when ransomware detonates on their machines?

Most companies have policies for many such situations, but assessing user responses and providing guidance in the case of cyber security incidents can go a long way to reducing the damage that can be done.

Evolution of training formats and trends

When organisations began conducting cyber security training in the 2000s, it was generally an annual exercise. Those training classes for the general user population may have been offered at employee onboarding only or annually for all employees for an hour or two.

Today we see companies and cyber security training service providers offering much more frequent sessions, sometimes even on a monthly basis. However, the more frequent training programs are shorter in duration. In fact, some sessions may only be three to five minute refresher videos and quizzes.

Shorter and more frequent training sessions offer multiple advantages, such as less time out of the workday at once, increased user participation, and greater user satisfaction. Perhaps most importantly, the training material can be updated faster to reflect the constantly changing threat landscape.

Videos are the preferred format, but user interaction is key. Training sessions start with reminders and updates about the threat landscape. Real-world examples have the most impact. Leverage cyber security news stories that have been publicised. Testing users’ knowledge at the end of each session can be enlightening for organisations to gauge the susceptibility of the workforce to prevailing attacker techniques and better quantify those risks. This can serve as a feedback loop for additional training, augmentation of training and other security controls. Testing can also be fun for the users if done right, with rewards and positive reinforcement for participation and correct answers.

Current training regimes also feature self-paced learning. Users receive invitations to take training when it fits their own schedules. This avoids conflicts with other work. Of course, deadlines and reminders to need to be put in place to ensure that training takes place. On the other hand, there is value to having short training sessions that interrupt non-critical work. This is to address situations when users are indeed busy and are more likely to make mistakes in judgment that adversely affect organizational security posture.

There are a number of cyber security training services to choose from that offer these kinds of training in multiple formats and styles. With account takeover and ransomware attacks proliferating, now is the time to emphasise cyber security best practices amongst your user populations.

Recommendations

  • Increase the frequency of cyber security training sessions for your employees, while decreasing the duration of each session.
  • Ensure that new training content is based on up-to-date threat information.
  • Look for cyber security training services that provide customizable content that meet the needs of your organisation.
  • Promote an open culture that encourages users to report suspicious behaviour and rewards cyber security vigilance.

Read more on Security policy and user awareness

Read More
Tama Geddes

Latest

FCS Draft Surge: The Rise of Small-School Prospects in Modern NFL Conversations

FCS Draft Surge: The Rise of Small-School Prospects in Modern NFL Conversations Every spring, draft chatter once focused almost entirely on blue-blood programs such as Alabama or Ohio State. Today that narrative feels outdated. Championship rosters increasingly feature players who sharpened skills on modest Football Championship Subdivision (FCS) fields, developing technique rather than basking in

Two Trap Games that Georgia Tech Football Cannot Overlook This Season

While Georgia Tech Football did not face its usual gauntlet of a schedule last season, the Yellow Jackets are no strangers to playing tough schedules, usually among the toughest in the country. Georgia Tech is going to be playing 11 power conference opponents this season, with eight ACC opponents and a non-conference schedule that includes

“I cannot divorce the two”: How Star Wars is blending technology, creativity, and products into the experience itself

(Image credit: Disney) “It’s like a community, right? And it’s a global community that people really love and identify with.” That’s how Bobby Kim, Global Creative Director at Disney Consumer Products, describes Star Wars fandom. And it’s a framing that feels especially fitting as another May the 4th is behind us and we’re weeks out

Trump administration defends right to ban content moderation experts from US

The Trump administration is fighting for the right to keep some social media moderation advocates out of the US. On Wednesday, US District Court Judge James Boasberg heard arguments in a lawsuit between the nonprofit Coalition for Independent Technology Research (CITR) and Secretary of State Marco Rubio and other Trump administration officials. The suit concerns

Newsletter

Don't miss

FCS Draft Surge: The Rise of Small-School Prospects in Modern NFL Conversations

FCS Draft Surge: The Rise of Small-School Prospects in Modern NFL Conversations Every spring, draft chatter once focused almost entirely on blue-blood programs such as Alabama or Ohio State. Today that narrative feels outdated. Championship rosters increasingly feature players who sharpened skills on modest Football Championship Subdivision (FCS) fields, developing technique rather than basking in

Two Trap Games that Georgia Tech Football Cannot Overlook This Season

While Georgia Tech Football did not face its usual gauntlet of a schedule last season, the Yellow Jackets are no strangers to playing tough schedules, usually among the toughest in the country. Georgia Tech is going to be playing 11 power conference opponents this season, with eight ACC opponents and a non-conference schedule that includes

“I cannot divorce the two”: How Star Wars is blending technology, creativity, and products into the experience itself

(Image credit: Disney) “It’s like a community, right? And it’s a global community that people really love and identify with.” That’s how Bobby Kim, Global Creative Director at Disney Consumer Products, describes Star Wars fandom. And it’s a framing that feels especially fitting as another May the 4th is behind us and we’re weeks out

Trump administration defends right to ban content moderation experts from US

The Trump administration is fighting for the right to keep some social media moderation advocates out of the US. On Wednesday, US District Court Judge James Boasberg heard arguments in a lawsuit between the nonprofit Coalition for Independent Technology Research (CITR) and Secretary of State Marco Rubio and other Trump administration officials. The suit concerns

Apple’s 2028 iPhone display sounds impossible, but Samsung and LG are scrambling to build it

Android phones have had curved displays for years and accepted the distortion as the price of aesthetics. Apple is spending two years and billions of supplier dollars to not accept it. Apple's all-screen iPhone 20 mockup Ice Universe / X Apple doesn’t ask its suppliers to build things. It tells them to, hands them a

WD sees sustainability as key business driver in an ‘AI economy’

Hard drive company WD promoted long-term operations and sustainability executive Jackie Jung to become its first chief sustainability officer in February, as it steps up sales to companies building AI data centers. Her vision: Turn sustainability into a “brand” for WD, a strategy that reduces risk for the $6 billion company (formerly known as Western

5 Business Ideas Worth Starting in 2026

If there is one thing Nigerians understand well, it is how to spot opportunity inside hardship. In 2026, that mindset will matter more than ever. The economy is tough, competition is rising, and many people are looking for smarter ways to earn, build, and survive. But even in a difficult environment, some businesses still stand

Getting a business loan now comes with a frequent flyer upside

Australian fintech Prospa has partnered with Qantas Business Rewards, letting eligible SMEs earn up to 500,000 points per loan. What’s happening: Australian fintech lender Prospa has partnered with Qantas Business Rewards to allow eligible small and medium business owners to earn up to 500,000 Qantas Points per loan when taking out a Prospa Small Business