SlideShare a Scribd company logo
In Your Company
How To
Create a
Security-Aware
Culture
Cyber Security
Awareness is
paramount to
avoiding a major
breach
I...and it's attainable!
Policy vs Culture
Culture
How employees
actually behave
Policy
What employees are
told to do
The Problem
People aren't hardwired to recognize
these constantly evolving threats. Even
though your employees want to keep their
company safe, everyone is vulnerable to
phishing attacks.
What is Phishing?
Info Access Data Cash
1 2 3 4
A cyber-attack that covers ANY attempt to collect
sensitive information in which the perpetrator disguises
their identity.
Hackers are often after:
So how
do we
fix it?
We train
them…
Right?
Is Disruptive
Covers Too Much
Doesn’t use cognitive best
practices
Takes Too Long
The Old Training Model
If training is intrusive, instills
fear, or tries to solve
everything at once, it does
not contribute to positive
security culture.
How to Instill a Positive Security
Culture in your Organization
Don't Punish Mistakes
Would you report a phishing
email if you risk being fired?
Train Everyone
Culture comes from the
top down.
Set Goals
Encourage employees
and track progress
Expect Mistakes
They are inevitable.
1-2 Key Takeaways
Frequent Training, <90
sec duration
Relaxed Setting
Tells Stories and
Uses Humor
The New Training Model:
Psychological Security
Your staff CAN learn to
avoid social engineers.
Not only will employees naturally keep the company safe
because of pattern recognition of phishing attacks, but they’ll be
excited to keep you safe because of the positivity, entertainment
value, and humor that your new culture provides.
People become
excited to spot
and report real
phishing emails.
How Psychological Security
Training Works
Analyze & Report
We send out behavioral data reports,
and continually provide valuable
feedback and support to broaden
cybersecurity awareness. Learn who
your security rockstars are, and who
needs a little more help.
Phishing Testing
Each month, we deploy real life
custom simulated phishing
attacks to sharpen your
employees’ awareness of social
engineering threats.
Awareness Training
If employees click on the simulated
phishing email, they are redirected
to a landing page with a short, funny,
but educational video along with tips
on how to spot and avoid phishing
emails in the future.
After 12 months of
training, employees are
70% less likely to fall
prey to a phishing
attack.
Get Safer Starting Today:
Call (833) 892-3596
OR
Email Info@HailBytes.com

More Related Content

Similar to How to Create a Security-Aware Culture in Your Company

BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESBUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESHuman Capital Media
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
The Role of HR in Preventing Cyber Crime Attacks on Businesses
The Role of HR in Preventing Cyber Crime Attacks on BusinessesThe Role of HR in Preventing Cyber Crime Attacks on Businesses
The Role of HR in Preventing Cyber Crime Attacks on BusinessesRalfHeyer
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdfAfour tech
 
The human factor
The human factorThe human factor
The human factorKoen Maris
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakesmxotech
 
Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity Scott Maurice
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur ReleMayur Rele
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingDavid Alderman
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021TrustwaveHoldings
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Tripwire
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayPC Doctors NET
 
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams CXO 2.0 Conference
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...ssuser2d55aa
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2Conf
 

Similar to How to Create a Security-Aware Culture in Your Company (20)

BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEESBUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
BUILDING A CULTURE OF IDENTITY PROTECTION FOR YOUR EMPLOYEES
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Role of HR in Preventing Cyber Crime Attacks on Businesses
The Role of HR in Preventing Cyber Crime Attacks on BusinessesThe Role of HR in Preventing Cyber Crime Attacks on Businesses
The Role of HR in Preventing Cyber Crime Attacks on Businesses
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
10 Most Important Strategies for Cybersecurity Risk Mitigation.pdf
 
The human factor
The human factorThe human factor
The human factor
 
Common Cybersecurity Mistakes
Common Cybersecurity MistakesCommon Cybersecurity Mistakes
Common Cybersecurity Mistakes
 
Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity Get Employees Invested In CyberSecurity
Get Employees Invested In CyberSecurity
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur Rele
 
Infosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness TrainingInfosec IQ - Anti-Phishing & Security Awareness Training
Infosec IQ - Anti-Phishing & Security Awareness Training
 
Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021Cybersecurity education catalog sae september 2021
Cybersecurity education catalog sae september 2021
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
Talking To The Board: How To Improve Your Board's Cyber Security Literacy – U...
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses Today
 
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams
CXO 2.0 Reviews Legit Strategies For Guarding Startups Against Cyber Scams
 
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...EB - Five Forces That Drive a Successful Managed Security Services Offering -...
EB - Five Forces That Drive a Successful Managed Security Services Offering -...
 
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
Education 2.0 Reviews Phishing Scams Targeting Students To Protect Their Info...
 

More from David McHale

How to save time and money by hosting your Git server on AWS in 6 minutes.pdf
How to save time and money by hosting your Git server on AWS in 6 minutes.pdfHow to save time and money by hosting your Git server on AWS in 6 minutes.pdf
How to save time and money by hosting your Git server on AWS in 6 minutes.pdfDavid McHale
 
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees..."Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...David McHale
 
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" InfographicDavid McHale
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca..."Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...David McHale
 
"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" InfographicDavid McHale
 
"You Have Been Breached" Infographic
"You Have Been Breached" Infographic"You Have Been Breached" Infographic
"You Have Been Breached" InfographicDavid McHale
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsDavid McHale
 

More from David McHale (8)

How to save time and money by hosting your Git server on AWS in 6 minutes.pdf
How to save time and money by hosting your Git server on AWS in 6 minutes.pdfHow to save time and money by hosting your Git server on AWS in 6 minutes.pdf
How to save time and money by hosting your Git server on AWS in 6 minutes.pdf
 
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees..."Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
"Beware COVID-19 Phishing Emails - Exploiting Confused And Stressed Employees...
 
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
"Beware COVID-19 Phishing Emails - Good Email Hygiene" Infographic
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca..."Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
"Beware COVID-19 Phishing Emails - Spreading Fear And Panic Of Increased Loca...
 
"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic"Tips For Detecting A Phishing Email" Infographic
"Tips For Detecting A Phishing Email" Infographic
 
"You Have Been Breached" Infographic
"You Have Been Breached" Infographic"You Have Been Breached" Infographic
"You Have Been Breached" Infographic
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen Accounts
 

Recently uploaded

BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdfDerekIwanaka1
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxmy Pandit
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastInstBlast Marketing
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanasabutalha2013
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)linciy03
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product DiscoveryDesmond Leo
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementBojamma2
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesDragon Dream Bar
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridHolger Mueller
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024Adnet Communications
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographerofm712785
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckHajeJanKamps
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corp.
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon investment
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxWorkforce Group
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiaFalcon Invoice Discounting
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content MarketingChuck Aikens
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9logalbokkahewagenitash
 

Recently uploaded (20)

BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024Equinox Gold Corporate Deck May 24th 2024
Equinox Gold Corporate Deck May 24th 2024
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Cracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptxCracking the Change Management Code Main New.pptx
Cracking the Change Management Code Main New.pptx
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 
New Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9loNew Product Development.kjiy7ggbfdsddggo9lo
New Product Development.kjiy7ggbfdsddggo9lo
 

How to Create a Security-Aware Culture in Your Company

  • 1. In Your Company How To Create a Security-Aware Culture
  • 2. Cyber Security Awareness is paramount to avoiding a major breach I...and it's attainable!
  • 3. Policy vs Culture Culture How employees actually behave Policy What employees are told to do
  • 4. The Problem People aren't hardwired to recognize these constantly evolving threats. Even though your employees want to keep their company safe, everyone is vulnerable to phishing attacks.
  • 5. What is Phishing? Info Access Data Cash 1 2 3 4 A cyber-attack that covers ANY attempt to collect sensitive information in which the perpetrator disguises their identity. Hackers are often after:
  • 6. So how do we fix it? We train them… Right?
  • 7. Is Disruptive Covers Too Much Doesn’t use cognitive best practices Takes Too Long The Old Training Model
  • 8. If training is intrusive, instills fear, or tries to solve everything at once, it does not contribute to positive security culture.
  • 9. How to Instill a Positive Security Culture in your Organization Don't Punish Mistakes Would you report a phishing email if you risk being fired? Train Everyone Culture comes from the top down. Set Goals Encourage employees and track progress Expect Mistakes They are inevitable.
  • 10. 1-2 Key Takeaways Frequent Training, <90 sec duration Relaxed Setting Tells Stories and Uses Humor The New Training Model: Psychological Security
  • 11. Your staff CAN learn to avoid social engineers. Not only will employees naturally keep the company safe because of pattern recognition of phishing attacks, but they’ll be excited to keep you safe because of the positivity, entertainment value, and humor that your new culture provides.
  • 12. People become excited to spot and report real phishing emails.
  • 13. How Psychological Security Training Works Analyze & Report We send out behavioral data reports, and continually provide valuable feedback and support to broaden cybersecurity awareness. Learn who your security rockstars are, and who needs a little more help. Phishing Testing Each month, we deploy real life custom simulated phishing attacks to sharpen your employees’ awareness of social engineering threats. Awareness Training If employees click on the simulated phishing email, they are redirected to a landing page with a short, funny, but educational video along with tips on how to spot and avoid phishing emails in the future.
  • 14. After 12 months of training, employees are 70% less likely to fall prey to a phishing attack.
  • 15. Get Safer Starting Today: Call (833) 892-3596 OR Email Info@HailBytes.com