Cyber Savvy Staff Create Solid Data Defense

Phishing is easy — and that made it No. 1 among cyberattacks that resulted in data breaches in 2020, according to the Identity Theft Resource Center. But, to borrow an old saying, phishing ain’t catching.

By Kelly Lindner

At least that’s the idea. A cyber savvy staff can be a solid defense against cyberattacks.

The best way to make your employees less likely to take the bait are the 3 T’s: training, testing and trusted contact check, according to Alan Wickham, TCDRS’ Information Security Analyst.

  • Training: To guard against cyberattacks, Alan recommends sending “micro assignments” to your employees every 30 to 45 days. “Good ones take 1 to 2 minutes to complete, cover one topic and allow the team member to learn an important bit of information and take it back immediately to their work,” Alan says. There are many companies that can design these trainings for you, or you can create your own, Alan adds.

  • Testing: Sending your employees phishing simulations, or fake phishing emails, can show you who gets hooked and who reports it. Testing is how you know who needs a refresher, Alan says.

    Automatic enrollment in follow-up training is also key: “Many security awareness training platforms have an automatic enrollment feature that can be enabled on phishing test campaigns, or if a user’s score falls below a certain percentage on a training assignment,” Alan says.

    Who reports the phish is important, too: “Encourage your employees to report suspicious emails, even if it turns out to be spam or a low-risk [email]. Executive leadership should be your strongest advocates for reporting everything suspicious.”

  • Trusted contact check: If one of your employees receives a suspicious email, even if it’s supposedly from a team member or other trusted contact, encourage them to call that contact and confirm they sent it. Advise them not to respond directly to the email.

With training, testing and trusted contact checks your employees can help keep your organization’s data safe.

Leah Golden contributed to this article.

 

Plan Administration

Video Library

Rather watch than read? Check out our
informational videos.
Explore Now