Start a Cyber Security Awareness Training Program Your Staff Can't Ignore

Corporate cybersecurity is a mindset as much as it is a strategy.

According to Verizon’s 2018 Data Breach Investigations Report, internal actors still account for an alarming number of data breaches. Last year, 28% of attacks involved insiders.

Although adequate security systems are vital, these findings point to the importance of educating employees on cybersecurity best practices. To efficiently protect their data, organizations need to develop a security culture throughout the company. The best way to do so is to introduce relevant, engaging, and regular security training for employees.

For those who tried to do so but failed and for those who are not sure how to start, we asked top cybersecurity experts for their best advice. Take a look at what they said and start implementing their tips today.

Cyber Security Awareness Training, Advice From Industry Experts

Jeff Towle From Intel

Jeff Towle

Sr. Cloud Solution Security Architect, Intel Corporation

Jeff Towle is an industry veteran in the Information Security, Information Governance, Risk and Compliance industries.  At Intel, Mr. Towle specializes in optimizing Intel-based security designs to contend with modern-day threat vectors for Cloud Service Providers. 

Mindfulness with safeguarding your Identity

An employees’ Corporate Identity is THE critical component to safeguarding all valuable top secret or highly classified documents, customer records, Intellectual Property, or design secrets.  Hackers will go to great lengths to trick employees/end-users to steal their access credentials.  This goes way beyond just making sure you update your password with strong alpha-numeric characters regularly per corporate password reset policy.  A good rule of thumb is to treat all the files, folders, documents, social media, corporate websites you have been granted access to as would your own bank account.  Sharing your corporate ID is never a good idea, even under temporary circumstances.  It’s also a good idea from time to time to check with IT to see what exactly you have access to.  Especially if you have been at the company for a long time.  Do you want access to systems you used 5 years ago?  This only creates risk, and it’s OK to ask for a list of things you still may be able to access and request that access be removed.

Attribution of all Business Communications

What is attribution?  Simply put, “Do I REALLY know who sent this message to me?  It’s important to train yourself to get into the habit of verifying the author or creator of a digital communication to you (via email, text, social media, automated message, website alert/notification, etc.).  This is an awareness technique that’s easy to adopt once you start to just ask the question.   With email, you can double-click on a name or hover your mouse on the From: field, and it will resolve to the actual email address.  SPAM, Phishing attacks and Malicious Ransomware messages often resolve to a string of characters that are easily seen as suspicious.  If the email doesn’t end in “companyname.com” you likely are being subjected to some sort of deceptive communication.  The same is true of malicious URL’s.  Instead of clicking on the link to find out what it resolves to, hover your mouse or right click to see what the whole string looks like.  These changes in behavior can really make a difference beyond just updating antivirus, OS patching, and firewall security controls.

Cyber Attitude

You can be your own best anti-hacking expert with these simple tips:


Chad Olivier, Shades of Grey Security

James Olivier

Principal Cybersecurity Consultant, Shades of Gray Security

James Chad Olivier, author of Trust Me I’m Lying: Banks Pay Me to Rob Them is the owner and Principal Cybersecurity Consultant of Shades of Gray Security.

Make Your Security Training Program More Personal

Training is much more effective following a social engineering test. If you can show them how you tricked them into letting you into the facility, the success statistics of a spear phishing attack, and/or the success of phone call social engineering, it leaves a big impact. Especially on the ones that know they were tricked. I never reveal who was to blame as I explain the test is not a witch hunt, but an awareness exercise.

I use colorful stories from my past exploits to make the lessons more enjoyable. They have just seen one example of a test, so I tell them some other ways an attacker might exploit them. My style is to lighten the mood and tell them from my perspective which makes it more cinematic in their mind. Like a good suspense thriller. Their responses range from amusement to frightened out how easy it is to con people. When I visit them for the next training (often a year later), my clients remember the old tales and tell me how they have seen similar things during that time, and are excited to learn some new stories. This keeps them much more attentive than just a boring statement of policy and procedures.

I don’t make it just about the company. I tell people about how they are tricked personally. How to avoid scams, credit card protection (how to avoid skimmers), and encourage them to share the material with their friends in family. I explain that if we can make ourselves safe, it is better for our employer, our family, and society in general.

If nothing else, no one wants a boring recitation of policy, procedures, and best practices. Liven it up, don’t speak in a monotone voice, and don’t just read bullet points. That applies to any presentation though.


Lisa Parcella

VP of Product Management & Marketing, Security Innovation

Lisa Parcella designs and delivers comprehensive security-focused products and educational solutions for Security Innovation’s diverse client base.

Training Should Engage Staff

Training needs to be engaging to build internal expertise and competency. Here are four ways to keep cybersecurity training exciting for employees:


Lauren and security awareness program expert

Lauren Hilinski

Digital Marketing Specialist, Shred Nations

Lauren’s company partners with document shredders across the nation and aim to make it easy to keep private business and personal information safe.

Use Real-Life Scenarios in Awareness Training


Robert Douglas, president of PlanetMagpie IT Consulting

Robert Douglas

President, PlanetMagpie IT Consulting
Robert has worked in the IT industry for 30+ years, consulting on everything from network infrastructure to cybersecurity.

Build each training session around a theme


Wade Yeaman founder and CEO, Fluid IT Services

Wade Yeaman

Founder and CEO, Fluid IT Services

Founder and CEO of Fluid IT Services has more than twenty years of experience including leadership and operational responsibility for functions related to both business and information technology.

Use Current Events To Resonate


Neil Readshaw

Chief Security Officer, Anonyome Labs

Neil Readshaw is a seasoned security and compliance executive, who spent over 20 years at IBM overseeing technical direction for security architecture, leading the security workstream for the IBM Cloud Computing Reference Architecture, and programming new global data security products.

Context is the most critical aspect of security awareness training

Context means a few things to me:

– Why it matters to our company, not just generic statements about risk management.
– When the message is relevant to the employees.
– For whom the message matters most, i.e., vary the training content or its delivery by job role, as much as is practical.

Here are some examples of how we train employees:

I try and spend some time with each new employee to reinforce our security culture from the beginning. I hope that also helps the new hires see that my team is approachable and helpful. I also get a benefit from this, as I can learn what the security environment was like at their previous company. It is a great way to get new ideas and challenge the ones with which I am currently comfortable. And it is the right way for new hires from the get-go to understand the robust security and data protection culture we have at Anonyome, and thus what will be expected of them.32. Teaching employees how to detect a phishing email is very important, especially as the mailbox is so often the key to password recovery/password reset for other services.

What has been most impactful is showing people real phishing emails that have been received by our employees, as opposed to boilerplate examples. I try and share these examples through our intranet platforms as they happen, to try and capitalize when other employees may be receiving similar phishes.

For the developers in our company, security about our internal assets, but also how we build and operate systems for our products. The unfortunate data breach at Equifax became relevant for our product teams when they understood that the issues at Equifax were due to old, unpatched software. That was a reminder of why we have procedures around patching systems and keeping our use of open source software components up to date.

We keep formal, recurrent security training to a minimum to avoid cyber safety burnout from employees. However, we regularly check in with key account and data owners to ensure compliance and processes are being adhered to and of course answer any questions employees have.


Greg Scott the author of Bullseye Breach: Anatomy of an Electronic Break-In

Greg Scott

Author of Bullseye Breach: Anatomy of an Electronic Break-In

Greg Scott is a veteran of the tumultuous IT industry. Greg started Scott Consulting in 1994 and Infrasupport Corporation in 1999. In late summer, 2015, after Bullseye Breach was published, he accepted a job offer with a large, open source software company.


Mihai Corbuleac, senior IT consultant at ComputerSupport

Mihai Corbuleac

Senior IT Consultant, ComputerSupport

I am Mihai Corbuleac, Senior IT Consultant at ComputerSupport.com – IT support company providing professional IT support, cloud and information security services.

Start sessions with relevant and scary cybersecurity statistics.

Facts like 46% of entry-level employees don’t know if their company has a cybersecurity policy or the fact that ransomware threats increased by 36% in 2018 or that 1 in 130 emails contains malware etc. It’s important for people to understand the risks of not being informed and educated regarding cybersecurity.

Secondly, always emphasize how destructive lack of knowledge and negligence could be. Finally, don’t forget to mention that most cyber-attacks could have been prevented if specific protocols would have been followed and that due diligence and staying alert represents the state of normality in today’s cybersecurity.


Sean Spicer from AgileIT

Sean Spicer

Director of Inbound Marketing, AgileIT

Sean Spicer is a 17-year digital marketing veteran who studied Marketing at U.C. Berkeley and earned a computer science certificate from Harvard.

The biggest issue with any security awareness training program is that the people most qualified to teach it are the same ones who are most liable to talk above their audience’s skill level.

While many of the issues in online security are fascinating, it is easy to lose the attention of your team if you get too detailed.


Derek Anderson the president of Biztek Solutions, INC.

Derek Anderson

President, Biztek Solutions, Inc.

Cyber Security training should be personable and relatable


Joshua Crumbaugh, hacker at PeopleSec, LLC

Joshua Crumbaugh

Chief Hacker at PeopleSec, LLC

Joshua Crumbaugh is one of the world’s leading security awareness experts and internationally-renowned cybersecurity speaker. He is the developer of the Human Security Assurance Maturity Model (HumanSAMM) and Chief Hacker at PeopleSec.


Eyal Benishti founder and CEO, IRONSCALES

Eyal Benishti

Founder & CEO, IRONSCALES

Eyal Benishti is a veteran malware researcher and founder and CEO of IRONSCALES, the world’s first automatic phishing prevention, detection and response platform.

Most cybersecurity security awareness training conducted for employees is related to email phishing, specifically providing tips and tricks for how business workers can better identify a malicious email. In theory, this is a sound investment. With nine out of ten attacks beginning with phishing, there is a human vulnerability that needs to be addressed.

The challenge is that today’s attacks are so sophisticated and complex that even hyper-phishing aware employees cannot identify them. As an example, 1 in 3 workers in the utility industry in Michigan recently opened a fake phishing email even though those people are mandated to go through security training. In fact, Verizon estimates that only 17 percent of phishing attacks get reported.

So what should companies do?

For starters, if they are going to invest in phishing training, then they should adopt tools that are gamified and tailored to each user’s specific level of awareness. This method is proven to keep people’s attention spans longer and help trigger information retention. Secondly, and most importantly, organizations must realize that humans alone – no matter how much training – can never be relied upon as an actual security safeguard. Instead, companies should look for ways to have humans and machines work together in layers so that when one misses an attack, the other has its back. In this scenario, each time there is an attack, both the human firewall and the machine get a little smarter, further reducing the risk of future phishing emails being successful.


James Goepel Vice President, General Counsel, and Chief Technology Officer at ClearArmor Corporation

James Goepel

James Goepel, Vice President, General Counsel, and Chief Technology Officer at ClearArmor Corporation

Improving cybersecurity awareness requires cultural changes

Employees need to better appreciate the potential business impacts of their actions, and they need to be held accountable. Until that happens, training is just something employees have to suffer through, rather than being something they understand they need to do. Accountability does not mean the company focuses on punishing those who do not comply. It can also reward those who do.

This can be achieved, for example, through gamification, with employees who do comply receiving positive rewards, such as Starbucks or Panera gift cards if they achieve and maintain certain scores. These kinds of positive reinforcements help move security from being an afterthought to the forefront of employees’ minds, which in turn helps security become part of the culture.


Tom Evans from Ashton Technology Solutions

Tom Evans

Ashton Technology Solutions

Over 35 years in IT. Cyber security awareness training for employees is a part-time occupation now that I am retired. End-user support and dealing with security issues occupied most of my working career.


Morey Haber, CTO, BeyondTrust

Morey Haber

CTO, BeyondTrust

With more than 20 years of IT industry experience and author of Privileged Attack Vectors, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He currently oversees BeyondTrust technology for both vulnerability and privileged access management solutions.

Test The Effectiveness Of Your Staff Training


Dean Coclin

Senior Director of Business Development, DigiCert

Dean Coclin has more than 30 years of business development and product management experience in cybersecurity, software, and telecommunications.

More useful than training videos are actual tests or exercises.

For example, a phishing exercise where employees are sent random phishing emails to see if they click on links or attachments provides valuable feedback to both the IT department and the employees. A contest amongst employees to see who can spot the most phishing emails (by forwarding them to an alias) puts some friendly competition into the mix while providing a valuable exercise. Rewards can be simple gift cards or a more complex points program which can be redeemed for prizes. Similar activities can target mobile devices or laptops by asking employees to download unauthorized software.


Pete Canavan Security Awareness Training Expert

Peter J. Canavan

Pet Canavan Safety Expert


Robert Huber, CSO, Eastwind Networks

Robert Huber

Robert Huber, CSO, Eastwind Networks

Eastwind Networks is a cloud-based breach analytics solution that aims to protect government agencies and enterprise organizations from cyber threats that bypass traditional security measures.


Benjamin Dynkin from Atlas Cybersecurity

Benjamin Dynkin

Atlas Cybersecurity

Benjamin is a cybersecurity attorney specializing in helping businesses understand, manage, and mitigate their cyber risk. He has published extensively and has been featured in a TEDx on cybersecurity and cyberwarfare.

Information security awareness requires hardening the human element

While there are countless strategies for making a data security program useful, to transform a compliance checkbox into a strong security posture.


Eric Sheridan, chief scientist at WhiteHat Security

Eric Sheridan

Chief Scientist, WhiteHat Security

As the Chief Scientist of the Static Code Analysis division at WhiteHat Security, Eric oversees all research and development for Sentinel Source and related products, defining and driving the underlying technology.

The pace of change within and outside of an organization is staggering. Many businesses are in the process of digital transformation where applications and the APIs that connect them are becoming the digital fabric connecting the world. No longer is it taking months or years to build out IT infrastructure and applications. In many businesses today, it might be just a matter of days or hours. We have customers who are pushing application updates multiple times a day.

Cybercriminals are staying on top of this change too, evolving their capabilities at a similar pace. Organizations and individuals must be vigilant when it comes to security education and training, and security vendors need to make it as easy as possible for businesses and consumers to get the training and education they need to stay current on potential cyber threats.

To stay ahead of security risks, here are the top three practices to put in place:


mike meikle, partner at SecureHIM

Mike Meikle

Partner, SecureHIM

Mike Meikle is a Partner at secureHIM, a security consulting and education company that provides cybersecurity training for clients on topics such as data privacy and how to minimize the risk of data breaches.

Companies should include information on general security threats, how hackers compromise systems (social engineering, malware, etc.), top hacker targets (Facebook, Twitter, LinkedIn), defense techniques, an overview of the hacking ecosystem, and the cost of lost data to the organization.

Initially, training should be done in-person with a presenter. A slide presentation with topics that highlight how hackers affect the specific organization’s industry should be included. Live websites and video should be used to keep the audience engaged.

Follow-up security awareness presentation can be via a recorded webinar that is updated to reflect the changing threat landscape. After the recorded session there should be a quiz to measure how effective the presentation was with the target employees.

Also, the Information Security group can send out regular email blasts on threats and create a monthly newsletter or blog to keep security in the forefront of employee’s minds.

The best way for organizations to protect their data and keep their employees from compromising security is to train them on information security best practices. This must be done on a continual basis, in layman’s terms and at a minimum of six-month intervals. Sixty to seventy percent of data breaches are due to social engineering and hardware theft; an issue best addressed by training.

If an organization keeps the issue of information security in front of employees, makes it engaging and keeps the organization informed on how threats are impacting the company, then the employees with have a reference point on how their behavior is or could impact the company.


Brian Dykstra

CEO, Atlantic Data Forensics  

People love hacker stories. As part of our business we handle data breaches for companies, so we have plenty of stories on how hackers broke into organizations and what they did once inside the network. Many of these stories are relatable and get people interested in the topic. Often we will have 2-3 hacker stories in a briefing to introduce better security practices or ideas.

People like to talk about themselves. I make sure that I provide plenty of time for people to ask questions about their personal cybersecurity concerns related to their email, social media and smartphone use. The concerns that are typically expressed by one person in the group are usually shared by others and always leads to lively discussion and better training.


Joshua Feinberg president of Data Center Sales & Marketing Institute

Joshua Feinberg

President, Data Center Sales & Marketing Institute

Joshua Feinberg is a digital strategist and revenue growth consultant, specializing in the data center, mission-critical, and cloud services industries. He is also a president of the Data Center Sales & Marketing Institute.


Larry Kahm, President, Heliotropic Systems, Inc.

Larry Kahm

President, Heliotropic Systems, Inc.

Larry Kahm is president and owner of Heliotropic Systems, an IT provider for small businesses and entrepreneurs, located in Fort Lee, NJ. He has clients throughout eastern Bergen County, New York City, and Long Island.

Some general “rules of thumb” about emails that ask you to pay for invoices or to send out financial or client data:

I realize that this last one flies in the face of all social contracts. But each of you has to weigh how much you value your businesses’ security program over some possibly ruffled feathers.


tom desot, EVP and CIO, Digital Defense, Inc.

Tom DeSot

EVP and CIODigital Defense, Inc.

As chief information officer, Tom is charged with key industry and market regulator relationships, public speaking initiatives, key integration and service partnerships, and regulatory compliance matters. Additionally, Tom serves as the company’s internal auditor on security-related matters.

Build A Powerful In House Defense Against Cybercrime


Kevin Gray Vice President, EnvisionIT Solutions

Kevin Gray

Vice President, EnvisionIT Solutions


Justin Lavelle

Chief Communications Officer, BeenVerified

BeenVerified is a leading source of online background checks and contact information. It allows individuals to find more information about people, phone numbers, email addresses, property records, and criminal records in a way that’s fast, easy, and affordable.

Start an Employee Security Awareness Program ASAP

The secret sauce for cybersecurity is focusing on two simple things – Talk about it and think about it. The reality is that dealing with security is a business issue (not an IT issue) and it involves hundreds of little things (usually not expensive or time-consuming) and not just the several big things you think you need to be doing (which can be costly and time-consuming).

Talk about it. We have found great success just getting people in the same room and telling stories. Call it a lunch and learn or do it in the afternoon and call it a snack and learn. The company buys some food, and everyone has to show up. Takes an hour or less and have someone come prepared with some best practices and stories of how people have made poor security decisions (we play this part for our clients). It is amazingly powerful seeing one employee explain how they got a phishing email and how they fell for it and say how they avoid it in the future and then hearing weeks later that someone else in the room saw the same thing but were not a victim because they listened to that story. It is super simple and really works. Just talk about it.

Think about it.  Most people do not want to bother thinking about security. It is easier to turn a blind eye and think nothing bad will ever happen to you. All the business person needs to do is to make a conscious effort to think about security. Ask their IT for information about their business applications and such – manage who has access with privileged access management, what rights do users have, what is the password policy (complex and expire after X months), should you be using MFA (Multifactor Authentication), reports for antivirus and software updates, etc. Also think about if there are any concerns with other business areas – physical access control, third parties like banks, etc. Think about it and you will be more secure.


Robert Siciliano Identity Theft Expert with HotSpot Shield

Robert Siciliano

Identity Theft Expert with HotSpot Shield

Train your staff and test your employees


Amanda Bigley

Marketing Associate, Hummingbird Networks

Amanda Bigley is a marketing associate for Hummingbird Networks. She enjoys researching and writing about all things cybersecurity.


cybersecurity training by Isaac

Isaac Kohen

Founder and CEO, Teramind

Isaac Kohen is the founder and CEO of Teramind, an employee monitoring, insider threat prevention platform that detects, records, and prevents malicious user behavior.

Cybersecurity awareness sessions for employees can often be boring wastes of time.

Combat the snooze fest of employee education sessions by making them engaging. This can be done by making the courses relatable. Create cybersecurity scenarios that employees can easily understand.

Utilize games, trends, gifs, memes, etc. whatever you need to convey your cybersecurity message. Understand your environment and hone in on whatever applies to your employees. You can easily incorporate funny and relatable scenarios to keep your employees attention all while helping them understand why cybersecurity is vital.

Leave a Reply

You must be logged in to post a comment.