Protect your team against email attacks. More than 90% of all cyberattacks start with a malicious email – and many attacks are successful because 97% of all recipients will occasionally fall for these traps and open the door for a hacker. While software products promise to identify and block phishing attempts, the reality is that even the most sophisticated technical solutions routinely fail to protect against targeted attacks. Therefore, we believe that the most effective approach is to turn the biggest vulnerability in your company – your team – into the first line of defense.
Based on solid instructional design, this program addresses the motivation gaps, knowledge gaps, and skills gaps among your staff to help lower the risk of a data breach caused by malicious emails. Incorporating the latest research on personal and organizational habit change, the program puts teams on track to permanently improve their behaviour when dealing with emails, and use a new set of skills to reduce the biggest and most dangerous attack surface threating your operation.
Improve password habits among your staff. The vast majority of hacking attacks – more than 80% – takes advantage of weak or stolen passwords to gain illegal access to computer networks. Because most people continue to use the same password across different services, and often across personal and professional accounts, the recent attacks against Linkedin, Dropbox, Yahoo, and many others may well have contained passswords that remain in use at your company. The best protection against weak and reused passwords is awareness: Only when staff understands why their password habits pose a threat to their employer, and how to easily manage a variety of strong and unique passwords, companies will become less vulnerable to this common attack.
This program will train your team on password security, introduce trusted tools to generate and manage strong passwords, and bridge skills- and habit-gaps among your employees that create major risks for their company. Program content deploys advanced instructional design to ensure that newly aquired information not only raises awareness, but actually changes how staff chooses and manages access to corporate accounts.
Strenghten your team’s ability to spot social engineering attacks. Criminals have always been masters in exploiting basic human behavior, and cybercriminals are no different. Many of the most damaging attacks against companies utiliize social engineering techniques to convince staff to reveal passwords, click links, open attachments, make unauthorized money transfers, and even open the door to the server room.
These attacks are highly effective and often targeted at key decision makers like CEOs, CFOs, or accountants who have access to the most valuable assets. This training exposes participants to a range of real-world examples that illustrate how social engineering attacks can be identified and blocked before any damage has been done. The module provides usable tricks and advice that can easily be applied, and includes memorable practice sessions that will improve resilience against attacks beyond the training context.
Protect your operations against security threats unique to China. In addition to global security threats that affect everyone, foreign companies in China face unique challenges that create vulnerabilities not present in other parts of the world. A combination of high staff turnover, a crippled Internet that makes popular web apps unusable, the extreme popularity of insecure communication apps, and ubiquitous video surveillance that is often improperly secured against hackers create an extremely challenging threat environment. Low security awareness among a young workforce leads to countless hacks and unofficial workarounds that circumvent corporate tools and policy to get things done more quickly – and often insecurely.
To reduce the risk of data loss and security breaches, this program raises awareness for common mistakes made by staff when handling corporate information. Employees learn about the risks of QR codes, the use of Wechat for business communications, eavesdropping and surveillance risks in public spaces, the dangers of file-sharing through domestic services, and more.
To learn more about how we protect your operations in Asia, please use the contact form. For regular updates on security in Asia, click the button below to subscribe to our newsletter!