With a leadership team in place and a set of known and likely email security threats identified, you’re ready to build out your advanced security strategy.

1. Engage all departments and levels.

Make cybersecurity relevant for employees up and down the organization. While the basic concepts don’t change, you get better results by tailoring the messaging and learning to the specific needs of each level and division of your organization:

  • Every department is susceptible to email security threats and should receive training, but it’s vital to train everyone in HR, payroll, accounting and the executive suite.
  • Top-level management may not realize that they, and their privileged credentials, are at risk. Whaling attacks specifically target those in the top level. Additionally, the top brass sets the tone for the rest of the organization and can ensure that the security program gets the appropriate backing – budget-wise, time-wise and resource-wise.
  • Employees who process high volumes of email as part of some business process or who do a lot of the same email-based actions each day are more likely to fall for scams.
  • Staff who aren’t heavy email users are also at a higher risk for being scammed because they’re unfamiliar with standard processes and don’t know how to sniff out something potentially fraudulent.

2. Create a continuous awareness and training program.

A one-time, once a year, training and awareness campaign isn’t sufficient to address the growing threat of email-based cybercrime. Security expert Robert Siciliano, CEO of Boston-based IDTheftSecurity.com, offers these tips to make sure training sticks:

  • Share key messages and tips via posters, your intranet, in email blasts, at staff meetings, and in orientations to remind your team what to look for and what to do in the event of an email scam.
  • Develop training activities in the correct context so they are relatable and relevant to participants. Be sure to include examples from real life that involve employees of equivalent rank.
  • Quiz staff regularly on procedures and common phishing scams. Provide additional education for those who struggle with the concepts and processes.
  • Deploy scheduled and surprise tests and drills to simulate email-based cybercrimes and see how your staff reacts. Offer additional training for those who don’t spot the fraud or use the right process.
  • Don’t punish or call out employees who get scammed during drills. Very smart people fall for these scams every day, which is the point you want to get out there.
  • Explain how cybercrime puts your organization at risk of financial or legal impacts, not to scare your staff, but to ensure they understand the organization’s livelihood – and theirs – is at stake.
  • Review processes and procedures for handling requests for funds or sensitive information, including processes for reporting suspected fraud and for alerting managers when a scam is detected.
  • Update training and awareness content whenever new threats arise so the entire staff is aware of tactics and preventive steps. This gives you a fighting chance of keeping up with the fraudsters.

3. Leverage technology solutions for training.

Don’t overlook the ways technology can support your awareness and training efforts.

Take advantage of email security products that feature end-user training functionality. Ideal solutions offer several formats, such as webinars, videos, book and classroom delivery blending practice and theory.

Third-party tools like Phishme enable you to test and train employees on how to identify and respond to suspect emails via simulations.

When choosing technology to support training, look for solutions that help you:

 

You may also like:

Prioritizing Cyber Resilience Preparedness

Cyber Resilience Preparedness:   Wh…

Cyber Resilience Preparedness:   Why it Needs to be a P… Read More >

Neil Murray

by Neil Murray

CTO and Co-Founder

Posted Aug 07, 2017

Advanced Security, Know the Data

Key Data on Why Cybersecurity is Everyon…

Key Data on Why Cybersecurity is Everyone’s Business Cybers… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Aug 17, 2017

5 Steps for Launching an Advanced Security Awareness and Training Init…

  “Ultimately, the security chain …

  “Ultimately, the security chain is as strong as its … Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Aug 17, 2017