The complete guide to security awareness training - usecure

18
The complete guide to security awareness training 2021

Transcript of The complete guide to security awareness training - usecure

The complete guide to securityawareness training

2021

How human-targeted attacks are set to evolve in 2021

Contents

02. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Why human error is the #1 security threat. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

When does human error take place?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How can employees make safer everyday decisions?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Keeping staff security-savvy when working from home. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How to address security when end users are at home. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The best format for security awareness training. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Old-school training VS modern training. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How to make modern training truly effective. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How to embed security into everyday staff culture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

How to build a security-savvy culture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The essential training topics for 2021. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Getting started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

03

04

05

06

07

08

08

09

10

11

12-15

16

01www.usecure.io

Among the major cyber threats, malwareremains a significant danger. The 2017WannaCry outbreak that cost businessesworldwide up to $4 billion is still in recentmemory, and other new strains of malwareare discovered on a daily basis.

Phishing has also seen a resurgence in the lastfew years, with many new scams beinginvented to take advantage of unsuspectingcompanies. Just one variation, the CEO Fraudemail scam, cost UK businesses alone £14.8min 2018.

Staff working from home are outside the directoversight of IT support teams, and oftenstruggle to deal with cyber threats andappropriately protect company information.

Failing to update software and operatingsystems, sending data over insecure networks,and increasing reliance on email and onlinemessaging has made employees far moresusceptible to threats ranging from malware tophishing.

While technical solutions like spam filters andmobile device management systems areimportant for protecting end users, with thenumber of threats and the multitude of systemsand communications through which staffperform work, the one unifying risk factor thathas to be addressed to fundamentally improvesecurity is the role of human error.

How human-targeted attacksare set to evolve in 2021

Introduction

The Covid-19 pandemic has posed many security challenges. Businessesaround the world have adjusted to working from home and socialdistancing, while also dealing with new threats posed by cyber criminalsexploiting fear and curiosity. Even as companies have dealt with thesechallenges, traditional cyber threats have been as prevalent as ever,making for an increasingly challenging threat landscape.

02www.usecure.io

In other words, had human error not been afactor, the chances are that 19 out of 20breaches analysed in the study would not havehappened at all.

"Human errorwas a contributingfactor to 95% ofall breaches"Since human error plays such a vast role in cyberbreaches, addressing it is key to reducing thechances of your business being successfullytargeted. It also allows you to protect yourbusiness from a far wider range of threats thanany single technical solution could - and canpotentially empower your workforce to activelylook out for and report new threats they mayencounter.

Mitigation of human error must be key tobusiness cyber security in 2021 - and in the nextsection we’ll look at the best ways to go about it.

Almost all successful cyber breaches share onevariable in common: human error. Human errorcan manifest in a multitude of ways: fromfailing to install software security updates intime to having weak passwords and giving upsensitive information to phishing emails.

Even as modern anti-malware and threatdetection software have grown moresophisticated, cyber criminals know that theeffectiveness of technical security measuresonly go as far as they are properly utilised byhumans.

If a cyber criminal manages to guess thepassword to an online company portal, or usessocial engineering to get an employee to makea payment to a bank account controlled by thecyber criminal, there is nothing that technicalsolutions can do to stop that intrusion.

In 2014, IBM conducted a study into the cyberbreaches that occurred among thousands oftheir customers in over 130 countries. Thisstudy was the most wide-reaching look intothe causes of cyber breaches that had beenperformed at that point, but its results havesince been corroborated by similar studies.

One of the key findings of the IBM study wasthat human error was a major contributingcause in 95% of all breaches.

Why human error is the #1security threat to your business

03www.usecure.io

Two factors have to be present in order forhuman error to manifest: opportunity anddecision. Opportunity means that there is asituation where a human is allowed to make amistake: for example, letting end users handlesoftware updates rather than forcing securityupdates through with patch management.Decision is the action of the individual: in thiscase, the lack of action in installing securityupdates when they are available.

A comprehensive mitigation effort includesboth reducing the opportunity for error as wellas improving the decisions made on the partof the end users. Taking action in both areas isessential to ensure that human error isthoroughly addressed.

When does humanerror take place?

In the case of patching, for example, a technicalmeasure such as introducing patch managementmay reduce the opportunity for human error to aminimum in most cases - but it is still essential toaccount for situations where the technicalsolutions has a temporary lapse, or if a newsituation such as a BYOD policy where users areallowed to use their own devices without patchmanagement is introduced.

In other cases, such as with phishing emails,technical measures such as spam filters andbreach detection software have a very limitedeffect in reducing opportunity for error whenfaced with a targeted attack. In those cases, theonly effective way to mitigate human error is byteaching end users how to make betterjudgments.

"Two factors have to be present inorder for human error to manifest:opportunity and decision"

04www.usecure.io

Eliminating pain avoidance

Issues such as weak password security and failure to patch software persist in organisations across the world,despite many computer users understanding why these issues are critical to security. The reason that action is nottaken despite knowledge is due to what we refer to as pain avoidance. Having a unique and strong passwordrequires more time to create, and more effort to remember, than a short, weak, or reused password.

Despite a user knowing better, this ‘pain’ caused by creating a strong password is often strong enough to makethe user go against their best judgment. This is compounded by the fact that, despite many users taking thecorrect action under optimal circumstances, busy and urgent work situations, as well as stress, can make securitymeasures feel even more ‘painful’ to users.

Understanding

The user has to recognise thatthey are in a situation wheresecurity is potentially at stake.Without recognising this, the usermay not even realise that they aremaking a decision at all throughtheir inaction.

Empowerment

The user has to know what thecorrect course of action is. Thisdoesn’t necessarily require thethem to completely understand thethreat, but often is as simple asreporting the situation to a personin the IT or security departmentwho can look into it.

Education

The user must know why securitymatters, so they understand theimportance of not ignoring securityprocedures and are aware of thepotential implications of a breach.

End users have to feel that the pain caused byfollowing security best practices is less thanthe satisfaction gained by not doing so.Technical measures such as passwordmanagers are essential in this, as they makeacting in a secure manner far easier: ifemployees don’t have to create or remembertheir own passwords, they have no reason notto use secure ones.

Simultaneously, the threshold for performingthe correct action must be lowered throughcultural change. This means putting security atthe forefront of decision making, and ensuring

05

that users never feel they are ‘wasting time’ bytaking appropriate security precautions.

Effective security awareness trainingaddresses not one, but all four of these factors.This means identifying situations where dataor systems could be compromised,understanding best practices, knowing whatthe potential consequences of breaches are,and finally helping to push through a culturalchange to create an environment wheresecurity considerations are always taken intodecision making.

How can employees make safereveryday security decisions?

www.usecure.io

Employees that weren’t used to workingfrom home before the pandemic quicklydiscovered some of the issues that it wouldcause: having to look after children and pets,dealing with poor internet connectivity, andputting up with all the other disturbancesthat can happen at home. In the midst of allthese new changes to the workingenvironment, security too often fell to thebottom of users’ priority lists.

End users that work from home are out of theoversight of the IT support department, andmay struggle with simple tech-related issues.In addition, essential security tasks likeupdating software and operating systems,updating router firmware and securing thenetwork, were suddenly placed into the handsof end users.

Keeping staff security-savvywhen working from home

Security Awareness at Home

The global response to the Covid-19 pandemic has caused manychanges in workplaces. The change that has had the mostsignificant impact on security has been the transformation of manybusinesses to having most or all of their staff switch to workingfrom home within a short period of time, which has led to many endusers being at higher risk of succumbing to online threats.

It’s no wonder that cyber criminals haven’twasted a second in exploiting thecircumstances of the pandemic to come upwith new forms of scams and cyber crime.

In the midst of allthese new changes tothe workingenvironment, securitytoo often fell to thebottom of users’priority lists.

06www.usecure.io

The IT support team can’t be at every endusers’ home, which is why it is essential toensure that, in addition to having the rightequipment, end users are aware of theirindividual responsibilities in keeping upsecurity. End users need to know that they areresponsible for ensuring that they only accesscompany information and networks ondevices and networks that are up-to-date andsecure.

Security awareness training is key to ensuringthat end users know how to keep up security.It’s best to break up training into small,digestible components, as this ensures thatusers aren’t overwhelmed. Training shouldalso take place regularly - once a month, atthe minimum - to ensure that key learning isretained, and that users won’t forget aboutsecurity as soon as the next work projectcomes along that shakes up the list ofpriorities. Lastly, it is important to test endusers.

How to address securitywhen end users are at home

"Securityawareness trainingis key to ensuringthat end usersknow how to keepup security"

It should be made clear that this isn’t forjudging or penalising users who struggle withtheir training, but rather to identify keysecurity gaps across the workforce, andaddress these before they can be exploited bycyber criminals.

07www.usecure.io

Security awareness training used to meanmaking end users sit through an annualsession consisting of hours of lectures andslideshows. The idea was that users wouldremember something of what they saw andheard - and in the worst case scenario atleast the box for ‘educating users’ could beticked. How did it far in actually improvingsecurity outcomes though? It didn’t work,and everyone hated it.

How to choose the best formatfor security awareness training

Old-School VS Modern Training

Security awareness training isn’t all one and the same. The way inwhich training is performed, structured and presented will have amajor effect on its effectiveness in genuinely improving securityoutcomes in your organisation. In this section, we’ll take a look atwhat exactly is the best way to perform security awarenesstraining for your end users.

session, there will simply be too muchinformation at once for any employee to digestand remember.

Even if users are given learning material totake with them or are sent occasionalreminders, chances are that most of thematerial in the training session will go inthrough one ear and out the other - forgottenin mere moments.

Lectures and slideshows are simply notengaging formats for end users to learn from.They fail to raise the interest of employees inthe same way that video and interactivecontent do, and too often are filled withunnecessary information that isn’t relevant toevery end user.

Slides filled to the brim with small text are sureto make any employee fall asleep halfwaythrough the session.

Why yearly 'tick-box'training fails miserably

There are a number of reasons why this typeof annual lecture-based training isn’t effective.

The first of these is that in an annual training

08www.usecure.io

The final, major reason why traditionaltraining isn’t effective is that it doesn’t makeuse of learning through repetition. If there is ayear between learning sessions, users simplywon’t remember what they’ve learned - andawareness of security issues in general willplummet in the days and weeks after training.Security can’t be a one-time thing, but must beyear round in order to be effective.

Security awareness training has increasinglyshifted to online software-as-a-servicesolutions. Cloud-based training offers someimmediate benefits over traditional methods,but isn’t necessarily the ultimate answer tosecurity awareness unless it delivers in certainareas that are essential for genuinelyimproving security outcomes.

How to make moderntraining truly effective

Breaking down material

There is a limited amount of information that aperson can absorb at a time. In order to notoverwhelm end users, training should be brokendown into segments, each with their own clear,simple message that’s presented in an easily-digestible fashion.

Continuous learning

Breaking down learning material also allowslearning to easily be made continuous, ratherthan a one-time thing, and allows courses to besent out regularly throughout the year - helpingkeep security awareness consistently on theminds of end users, as well as improvinglearning retention.

Relevant material

When an end user is given information that theyfeel is not relevant to them, they will quicklystart losing interest and paying less attention.Learning material needs to not only avoid jargonand technical terms, but be made with real-lifesituations in mind that the end user couldencounter.

Embed security into your culture

Training has to be a part of a business culturewhere security is always given the consideration

it needs, and users are encouraged to bring upconcerns and ask questions.

Practical advice

It’s essential that employees walk away fromtraining with actual steps in mind that theycan put to use right away in their daily workactivities. Giving employees the chance to puttheir training to test right away also helpsbuild memory - and can be achieved usingtools such as phishing simulation.

Video and interactive content

Video and interactive content are great forengaging users who may prefer a differenttype of learning experience. Many people learnby doing, answering questions or otherwisetaking part.

Measuring the impact

It’s essential that, after training sessions, usersare tested on what they’ve learned. This helpsyou know that users are walking away havinglearned something - but also helps thelearning process of users as they recollect theinformation they have just learned from theirown memory.

09www.usecure.io

With the growing number of threatspresent, as well as the increasingcomplexity of business services andaccess to data and systems frommobile devices, it is impossible toknow where the next threat oraccidental leak to your businessmight appear.

This is why security shouldn’t beabout ensuring that your end userschoose strong passwords or followother specific steps - but rather aboutempowering them to be activeguardians of your business, itssystems, devices and data.

How to embed security intoeveryday staff culture

Building a Security-Savvy Culture

Security awareness training will not be effective in improvingsecurity outcomes if it is not accompanied by cultural change.Comprehensive training will teach end users how to recognisesituations where security is at risk and how to deal with themappropriately - but this knowledge is not going to be put intopractice unless the user feels that security is valued in their culture.

10www.usecure.io

"Comprehensive trainingwill teach end users howto recognise situationswhere security is at riskand how to deal withthem appropriately - butthis knowledge is notgoing to be put intopractice unless the userfeels that security isvalued in their culture."

Getting C-level support

Cultural change and the company’s valueshave to come from the top. Seniormanagement has an important role to play inemphasising the role of security in the business- but it is essential that they grow, rather thandictate, the new culture.

This means encouraging employees to take anactive role by asking them to bring up concernsrelating to their own roles, and prompting themto ask questions and become engaged withsecurity issues. This way, users feel like theyare involved in the security process, and startactively thinking about the securityconsiderations in their own roles.

Least privilege access

While the principle of least privilege is oftenseen as a technical measure - limiting eachuser to only the privileges that they require fortheir specific duties - it should also beembedded directly into corporate culture.

This means encouraging users to activelyreport when they have access to more data orsystems than they need - helping to limitpossibilities of breaches.

Physical security

In terms of physical measures, items likeposters can be helpful in building a securityculture, and also contain helpful reminders ontopics such as password strength.

It’s important to remember though that juststicking a poster on a wall won’t achieveanything by itself, but they should be used asstarters for discussion, or serve in complementto training material that users are alreadyengaged with.

How to build asecurity-savvy culture

11www.usecure.io

Phishing Techniques

Social Engineering

Security at Home

Secure Internet & Email Use

Working Remotely

Mobile Device Security

Password & Authentication

Cloud Security

Public Wi-Fi

Physical Security

Removable Media

Secure Social Media Use

Top topics for 2021:

1.

2.

3.

4.

5.

6.

7.

8.

9.

10.

11.

12.

What are the essentialtraining topics for 2021?

Essential Training Topics for 2021

While each organisation and each job role will have differentrequirements, there are some essential areas that are worthensuring every single end user is aware of.

#1. Phishing Techniques

Phishing remains a huge threat. One of thereasons why phishing is so popular amongcyber criminals is that it can be easilycustomised to make use of any event orcircumstance - such as the Covid-19 pandemic- to target users with new scams. Template-based scams offering information to victimshave become more popular than ever - whilespear-phishing attacks that target individualusers and businesses remain the mostdangerous kind.

End users are most susceptible to phishingemails that create a sense of urgency or offersomething valuable to the user. It’s essential totrain end users to double-check that they cantrust who an email is from before clicking linksor giving up information. While it’s impossiblefor users to catch every phishing email,security awareness combined with spam filtersensure that the potential reach of phishingemails is limited to the minimum.

12www.usecure.io

#2. Social Engineering

Phishing is only one of many types of socialengineering attacks. Physical and phone-basedsocial engineering attacks are also used bycriminals to gain access to secure premises andsensitive data.

It’s essential that employees are educated onthe different types of social engineering attack -from those over the phone to in-person threats -and understand how to properly deal with anypotential offender.

#3. Security at Home

Working from home was raised to the forefrontof end user security in 2020, as businessesacross the globe encouraged staff to switch toremote working. The speed of this transfermeant that many users were left ill-equippedwith tools and knowledge to ensure that theycan carry out their work securely.

It’s essential to train any employees workingfrom home how they can ensure that thecompany’s data and network aren’tcompromised through remote access. Updatingsoftware, protecting Wi-Fi networks, and usingsecurity tools such as VPNs to ensure secureaccess have become an essential part of enduser training.

#4. Secure Internet & Email Use

In 2021, it is a rare employee that doesn’t usethe internet or email at work. While thepandemic has made businesses more reliant onthe internet than ever, use of the internet alsocarries security risks. Users may inadvertentlyinstall malware, leak data, give up credentials tophishing emails or fall for any of the many otherattacks that cyber criminals are targeting themwith.

Training users to use the internet and emailsecurely is essential. Most of this comes downto awareness: knowing that emails can causedata breaches if sent carelessly, and thatmalicious sites can contain malware.

There should also be practical advice in training,such as informing users about the differencebetween cc and bcc fields, and what the HTTPSencryption symbol on websites means.

#5. Working Remotely

In 2021, remote work is going to be morepopular than ever. While the pandemic hasgiven a jump-start to home working in manybusinesses, it is likely to continue beyond thepandemic. Employees have started to get usedto working from home, and businesses arerealising its benefits.

Working remotely also carries risks. Laptops,mobile phones, tablets and other devices canpose a serious security threat if they are lost orstolen. If employees store or access companydata from their mobile devices, this data allbecomes vulnerable if a device falls into thewrong hands. When educating users on secureremote working, focus should be placed onhelping users identify points where systems ordata could become compromised - and thesteps they can take to mitigate these risks.

#6. Mobile Device Security

Mobile device use in businesses has beengrowing quickly, and in 2021 this trend isexpected to become even more widespreadthan before. Mobile devices such as laptops,mobile phones and tablets allow employees towork from home, coffee shops, while travellingor just about anywhere they wish, providingflexibility to both themselves and the business.As convenient as mobile devices are, they docome with risks that users must be educatedabout.

Users should be educated on how mobiledevices can potentially expose company dataand systems to unauthorised access. Thisinvolves access through lost or stolen devices,as well as malicious software and illegitimatethird-party apps.

13www.usecure.io

#7. Passwords & Authentication

Passwords continue to be a major headache forbusinesses, employees and customers alike.Humans simply aren’t designed to rememberlong, complex phrases - especially not dozens ofthem. This means that employees areconstantly tempted to take the easy way outand make them easy to remember - especiallywhen they are required to share access to appsand services with their colleagues.

The majority of end users will be aware of whypassword security matters, and have the basicgist of what makes a strong password. Thefocus on training around passwords andauthentication should be on focusingpracticable advice on how to keep up passwordsecurity without making life harder for your endusers. This means encouraging the use ofpassword managers (if this is something yourbusiness permits), asking employees to turn ontwo-factor authentication for all services andsystems with access to sensitive data, as wellas teaching employees how to make apassword that is both reasonably complexwhile being reasonably easy to remember.

#8. Cloud Security

Over the last few years, business services anddata have increasingly shifted to the cloud. In2021, this trend is coming to culmination, withmany business operations being conductedentirely using web-based tools and services.While the cloud offers great flexibility tobusinesses, it is essential that users know howto use and access it securely.

Strong passwords and authentication, as wellas email security, become of extra importancewhen your business uses cloud services.

A bad actor that guesses an employee’spasswords could access your sensitive datafrom anywhere in the world, which is why it isessential that employees are educated on themeasures necessary to keep cloud accountssecure. Multi-factor authentication is especially

a must for all services and apps that containsensitive business data.

#9. Public Wi-Fi

As users increasingly work while on the go,chances are that they will connect to businessservices, networks or data from public Wi-Fiaccess points. Public Wi-Fi is highly convenientfor mobile work, but also comes with securityrisks.

It’s important to teach end users that their datacould potentially be intercepted on public Wi-Finetworks. If you allow your end users to accesscompany data or services through public Wi-Finetworks, you should equip them with VirtualPrivate Network software and educate them onusing it in a secure manner.

#10. Physical Security

Even as cyber security threats multiply, it isessential that physical security is notoverlooked. It is no use protecting data withstrong passwords and multi-factorauthentication if an unauthorised person cansimply walk into the office and pick up a papercopy of a sensitive document right off theprinter tray.

When training end users in physical security, itis essential that focus is placed on identifyingand mitigating threats relevant to individual endusers’ day-to-day activities. If your business isbased in an office, every employee is going towalk through the office door - so tailgating is anexample of a security threat that is relevant toall employees. End users should be trained toactively think about what areas and documentsare secure, and ensure that they are alwayslocked securely or accounted for when not inuse.

14www.usecure.io

#11. Removable Media

Even as file sharing and online collaborationservices on the internet have become morepopular, removable devices are still seeingwidespread use in businesses. As useful asremovable media devices are, they pose manyrisks: they are easily lost or stolen, potentiallyleading to compromise of data, or could bereplaced with devices containing malware. Acommon scam is leaving a virus-infected USBdrive in an office parking lot, waiting to bepicked up and inserted into a companycomputer by an unsuspecting employee. Inaddition, many users are unaware that it’s notonly storage devices that could pose a risk: evensimple USB or charging cables could bemodified by a cyber criminal to containmalware.

Educating end users about secure use ofremovable media comes down to accountability.It should be made clear to users that they haveto take responsibility for devices that are undertheir control - and that they should not plug inany devices that have been unaccounted forinto any computer, but instead report them tothe IT team or to security personnel.

#12. Secure Social Media Use

Employees - and businesses - spend anincreasing amount of their day on social media.It is essential, however, to ensure that thebusiness’ security won’t be compromised overcareless use of social networks.

Focus on social media training should be placedon making users aware that what they sharemight be available to anyone on the internet -and that even small details from within theoffice could be crucial to attackers. For example,an innocent selfie from within the office couldshow a whiteboard in the background withsensitive business information, or even acustomer’s details.

15www.usecure.io

Start your free trialGrab a 14-day free trialIdentify your users' risk areas Get started in minutes

Get Started >>

www.usecure.io/en/free-account

Watch a quick demoAccess on-demand demosSee key features in actionUnderstand usecure in minutes

Explore Now >>

www.usecure.io/en/demo-centre

Analyse human risk.Empower the workforce.Secure your business.

Get Started with usecure

Measure, boost and monitor employee cyber awareness throughadmin-lite automation. Grab your free 14-day trial of usecure,or explore a library of on-demand demos.

We believe that your end users aren’tyour weakest link - but your first line of defence.

usecure offers bite-size security awareness training that is designed to keep yourusers engaged. Entertaining videos and interactive content ensure that end usersare always looking forward to their next training module - while the intelligentautomation at the heart of the usecure platform keeps admin time to a minimum.

16www.usecure.io