Cybersecurity is a shared responsibility
October is European Cyber Security Month (ECSM) and we have produced a range of materials in line with the ECSM objective to change the perception of cyber threats through:
- Sharing of good practice
The products mirror the themes of ECSM and are designed to:
- Deliver key messages that inspire employees to engage
- Stand out from everyday information
- Be different, make a high impact and be retained
For operators of essential services (Critical National Infrastructure)
We have produced a Flashbook on the Network and Information Systems Directive (NIS-D) cybersecurity regulation. The Flashbook will help you you understand the directive that ensures the security and resilience of your network.
Take full advantage of ECSM – use our solutions to review your organisation’s state of cybersecurity and educate employees on emerging technologies.
Help your people be more cyber savvy and recognise that cybersecurity is a shared responsibility.
Week 1 - Evolution of threats
Knowing the back story is essential
Technology is increasingly more sophisticated and embedded in our lives.
But the opportunities, motives and means to infiltrate technology have evolved too.
Add to this the ease with which anyone can access the tools to launch a cyber attack, and you begin to see the potential for abuse.
Our infographic neatly encapsulates the staggering numbers and trends behind this here-to-stay phenomenon:
- Volume and types of attacks
- The costs
- Methods employed
Bringing these facts to your employees’ attention helps them appreciate the nature and scale of the matter.
Week 2 - Phishing
‘Don’t take the bait’ game
Time pressure, volume of work, distractions, or simply not knowing the risks can all lead to someone taking the phishing bait.
Practical demonstrations for employees to experience the phishing threat for themselves are invaluable.
Our game tests the player on a range of phishing tactics:
- Genuine sender email address
- Spelling and grammar
- Threats and urgent calls to action
- Unsafe links
Week 3 - Digital Footprint
Credential stuffing and top ten tips
Continuing the hands on, practical approach from our ‘Don’t take the bait’ game, our credential stuffing exercise places the user in the hacker’s shoes. They see firsthand how easy it is to mine data from a social media account to be able to crack the password.
When it comes to the concept of a digital footprint, we find that, in general, people:
- Have varied understanding of what it is
- Don’t always appreciate how far their digital footprint extends
- Are unaware how their digital footprint can be used against them
- Don’t know the basic steps to take to protect their data
To help, we provide also a top ten tips list to manage your digital footprint and protect your privacy and data.
What goes online, stays online.
Week 4 - The Internet of (Insecure?) Things
From everyday devices such as smartphones and doorbells, through to connected networks that span entire cities, the IoT touches us all.
And unsurprisingly, IoT devices are prime targets for cybercriminals — there were an average of 5,200 IoT attacks every month in 2018.
Our animation helps employees to keep their IoT devices secure.
For operators of essential services
If you are part of the Critical National Infrastructure, or an operator of an essential service, you’ll know that cyber attacks on essential services are on the rise. Our Flashbook assesses the situation and covers:
- Who is considered an essential services operator
- Motives and methods behind cyber attacks
- Real attack examples
- The Network and Information Systems Directive (NIS-D) regulation
How to use your Cyber Security Month materials
The materials can used as:
- A standalone campaign
- Part of your existing information security awareness programme
- A launch platform for your new cybersecurity programme
- Add your company logo
- Add up to two colours from your company colour palette
No content customisation is required.