SlideShare a Scribd company logo
1 of 13
Security Awareness
Training
Make security awareness a
part of your asset’s
camaraderie
Because security awareness is not just a matter of
IT!
Do you protect intangible assets of
your company as vigilantly as you
do for your tangible assets?
If not,
you might be inviting losses worth millions!
You now have one stop solution to
save your sensitive and personal data
from falling into wrong hands.
Security awareness training is the key!
Don’t fret!
Security awareness training is a program
where the employees and the employers of
the firm get educated about computer
security.
Everything from company’s policies, work
procedure to different types of plausible
security attacks are included in this training
program.
CyberSecurity
The famous Marriott international group of
hotels is famous for its diversified hospitality
and broad portfolio of lodges and hotels.
In the year 2018, Marriott came under the
scanner when it faced one of the largest
security breach which costed a loss of 500
million customers information data breach.
MarriottInternational
The attacker’s pattern of data breach came
as an unconventional method as along with
stealing of personal data like name, address
and credit card information; the attackers
also stole passport number, travel location
and other related details.
Although the breach was detected in 2018, it
could have dated back to 2014!
MarriottInternational
The famous health-tracking app witnessed a
lot of success when it was sold to under
armour for a whopping $475 million.
The attackers seemed to be enticed by the
same success when they decided to breach
the security of the famous app.
The app had to face a loss of 150 million
personal and sensitive data of its customers.
MyFitnessPal
The fitness tracker were left shaken when
they learned that the attackers got the
access to information like username, e-mails,
passwords, driver licence number and even
credit card details.
Although the breach was detected in
February 2018, it might have dated back to
much earlier as reported by the sources.
MyFitnessPal
So what do we learn from these examples?
No matter how famous or established the companies are,
noone is left from the radar of these phishers.
The most common element in both the above-mentioned
cases was the timeline of detection and occurrence of the
breach.
Is the data of your company still safe?
Save yourself some major trouble and take a step before
things go berserk.
Do’s and Don’t in
Cybersecurity Training
Do’s
● A comprehensive and detailed
training for employees working at
every level.
● A comprehensive and detailed
training for employees working at
every level.
● Important topics like that of
passwords and threat response to be
added in a separate session.
Don’t
● Keep the sessions more engaging
and formal and don’t resort to
classroom-type teaching.
● Don’t educate the employees
everything in just one session.
● The training should be on-going
and must have multiple and short
sessions.
“ An attacker looks for a single
vulnerability to leave you in
millions of losses.
Don’t leave space for that little vulnerability.
Security Awareness Training is the shotgun you need, to ride
in vehicle of prosperous business.
About us
TIKAJ provides Information security and
business continuity consulting, compliance and
professional services. Through its Security As
A Service, TIKAJ helps in mitigating cyber
threats, provides an effective training solution
and via its business continuity application
provides an easy to implement and maintain
business continuity management system
compliant to the ISO 22301.
www.tikaj.com contact@tikaj.com

More Related Content

What's hot

Understanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisationUnderstanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisation
Rowena Fell MA CPP FSyI
 

What's hot (20)

Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Understanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisationUnderstanding the Insider Threat to your organisation
Understanding the Insider Threat to your organisation
 
IT Security
IT SecurityIT Security
IT Security
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020Top Cloud Security Risks of 2020
Top Cloud Security Risks of 2020
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
IT security
IT securityIT security
IT security
 
CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?CYBERSECURITY | Why it is important?
CYBERSECURITY | Why it is important?
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security
Information SecurityInformation Security
Information Security
 
When thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacksWhen thieves strike: Executive briefing on SWIFT attacks
When thieves strike: Executive briefing on SWIFT attacks
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Cyber security by nayan pandey
Cyber security by nayan pandeyCyber security by nayan pandey
Cyber security by nayan pandey
 
Human Risk Management
Human Risk ManagementHuman Risk Management
Human Risk Management
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 

Similar to Security Awareness Training

Similar to Security Awareness Training (20)

Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
How to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdfHow to Start a Cyber Security Business.pdf
How to Start a Cyber Security Business.pdf
 
Why Cyber Security Is important?
Why Cyber Security Is important?Why Cyber Security Is important?
Why Cyber Security Is important?
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference ExpertsEnterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
Enterprise Fraud Prevention & Scam Detection Tips By CXO 2.0 Conference Experts
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023BIZGrowth Strategies — Cybersecurity Special Edition 2023
BIZGrowth Strategies — Cybersecurity Special Edition 2023
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber Security | Mayur Rele
Cyber Security | Mayur ReleCyber Security | Mayur Rele
Cyber Security | Mayur Rele
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Matt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptxMatt_Cyber Security Core Deck September 2016.pptx
Matt_Cyber Security Core Deck September 2016.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Security Awareness Training

  • 2. Make security awareness a part of your asset’s camaraderie Because security awareness is not just a matter of IT!
  • 3. Do you protect intangible assets of your company as vigilantly as you do for your tangible assets? If not, you might be inviting losses worth millions!
  • 4. You now have one stop solution to save your sensitive and personal data from falling into wrong hands. Security awareness training is the key! Don’t fret!
  • 5. Security awareness training is a program where the employees and the employers of the firm get educated about computer security. Everything from company’s policies, work procedure to different types of plausible security attacks are included in this training program. CyberSecurity
  • 6. The famous Marriott international group of hotels is famous for its diversified hospitality and broad portfolio of lodges and hotels. In the year 2018, Marriott came under the scanner when it faced one of the largest security breach which costed a loss of 500 million customers information data breach. MarriottInternational
  • 7. The attacker’s pattern of data breach came as an unconventional method as along with stealing of personal data like name, address and credit card information; the attackers also stole passport number, travel location and other related details. Although the breach was detected in 2018, it could have dated back to 2014! MarriottInternational
  • 8. The famous health-tracking app witnessed a lot of success when it was sold to under armour for a whopping $475 million. The attackers seemed to be enticed by the same success when they decided to breach the security of the famous app. The app had to face a loss of 150 million personal and sensitive data of its customers. MyFitnessPal
  • 9. The fitness tracker were left shaken when they learned that the attackers got the access to information like username, e-mails, passwords, driver licence number and even credit card details. Although the breach was detected in February 2018, it might have dated back to much earlier as reported by the sources. MyFitnessPal
  • 10. So what do we learn from these examples? No matter how famous or established the companies are, noone is left from the radar of these phishers. The most common element in both the above-mentioned cases was the timeline of detection and occurrence of the breach. Is the data of your company still safe? Save yourself some major trouble and take a step before things go berserk.
  • 11. Do’s and Don’t in Cybersecurity Training Do’s ● A comprehensive and detailed training for employees working at every level. ● A comprehensive and detailed training for employees working at every level. ● Important topics like that of passwords and threat response to be added in a separate session. Don’t ● Keep the sessions more engaging and formal and don’t resort to classroom-type teaching. ● Don’t educate the employees everything in just one session. ● The training should be on-going and must have multiple and short sessions.
  • 12. “ An attacker looks for a single vulnerability to leave you in millions of losses. Don’t leave space for that little vulnerability. Security Awareness Training is the shotgun you need, to ride in vehicle of prosperous business.
  • 13. About us TIKAJ provides Information security and business continuity consulting, compliance and professional services. Through its Security As A Service, TIKAJ helps in mitigating cyber threats, provides an effective training solution and via its business continuity application provides an easy to implement and maintain business continuity management system compliant to the ISO 22301. www.tikaj.com contact@tikaj.com