article thumbnail

How to Create an Imagination Station

CLO Magazine

They cite as an example a team that needed software which was blocked by the company’s firewall, so the team tunneled past IT to access it for their project. As a general reportedly said after allowing soldiers to use social media, “We trust them with weapons; I guess we can trust them with Facebook.

Create 51
article thumbnail

Four Principles for Effective Training Systems

Interactive Services

As ever more employees and third parties work with companies’ confidential data, cybersecurity has exploded from a concern for the IT department to an enterprise-wide risk of the highest priority. A Practical Example: Cybersecurity. To put it another way, as the scope of cybersecurity training has broadened, so has the nature of it.

article thumbnail

10 Security Awareness Training Topics

Ed App

Sometimes, they also play on the lax security of public Wi-Fi networks to slip malware onto computer devices or eavesdrop on online activities, from logging in to social media pages to entering bank accounts. . Social Engineering. Usually, attackers use impersonation such as your bank account agent or even a coworker.