Recommended as part of ISO 27001 Training or Day 1 of a broaderInduction Training for new recruits
A cyberattack can destroy a business. Whether that involves Denial-of-Service, deletion of files, ransomware, or other types of cyberattacks, the most frequent event they all have in common is human failure. And currently, the most common human failure is becoming a victim of a Phishing e-Mail, which has been attributed to >90% of successful information security breaches.
The most likely target organizations may surprise you, namely smaller organizations likely to be suppliers to major organizations, where the smaller organization is perceived as an easier route to successfully attacking the major one.
From the moment anyone has access to a company PC, Laptop or another device capable of receiving and sending email, you are vulnerable to Phishing. And phishing emails are not always easy to spot Action is needed by you. And so, this short video presentation, which is free, is recommended as part of Day-1 Induction Training for new Recruits and as a refresher course.
Why is Information Security Training Necessary?
From published research, we know that the human factor is the 'weak link' in cybersecurity. Yet, despite this knowledge, the situation is not improving. This is confirmed by our own experience in on-site auditing. People working for companies seeking ISO 27001 Certification are simply not vigilant when it comes to their part in maintaining the organization's information security.
And no more so than their lack of awareness of the dangers of spear phishing and their helplessness in the face of clone phishing. The fact that snippets of sensitive information from various sources within an organization can be spliced together to facilitate a crushing cyber attack simply does not register.
Costliest Phishing Attacks in Recent History |
||||
Phishing Victim | Industry | Year | Estimated Losses | Mode of Attack |
Sony Pictures | Entertainment | 2014 | $100 million | Spear Phishing |
Facebook and Google | Technology | 2013-2015 | $100 million (combined) | CEO Fraud |
Crelan Bank | Banking | 2016 | $75.8 million | CEO Fraud |
FACC AG | Aerospace | 2016 | $47 million | CEO Fraud |
Ubiquiti Networks | Technology | 2015 | $46.7 million | CEO Fraud |
Leoni AG | Energy and Data Management | 2016 | $44.7 million | CEO Fraud |
Xoom | Money Transfer | 2014 | $30.8 million | CEO Fraud |
Pathé | Entertainment | 2018 | $21 million approximate | CEO Fraud |
Tecnimont SpA | Engineering, Technology, Energy | 2019 | $18.45 million | CEO Fraud |
The Scoular Company | Farming | 2015 | $17 million | CEO Fraud |
Data retrieved March 04, 2022
Common Problems with Information Security Training
In most instances of security breaches we have come across, there are training records to inform us that cybersecurity training has taken place but there are 2 repeated problems. Firstly, the training is rarely given as part of induction training, when recruits are most likely to inadvertently compromise information security arrangements, and, secondly, the adequacy of the awareness training is rarely evaluated (such evaluation itself acting to reinforce awareness). To begin to address the problem we have produced a short 9-minute video presentation called 'The dangers of Phishing'. You can view it for yourself by clicking on the button below.Add this to your ISO 27001 Training Videos or General Information Security Training Videos- it's free.
If you like the video, feel free to use it as part of your Induction Training. Just add a link to it in one of your own Induction Training presentations.Afterwards, we would recommend that for Cyber Security Awareness, you evaluate the effectiveness of the training given. The periodic circulation of a test phishing email, with subsequent review of outcomes with all concerned, is especially effective in engendering continuous vigilance. Also, we suggest including short interviews of all staff as part of your Internal Audit Programme for your Information Security Management System.
Interested in ISO 27001, the Information Security Management System Standard?
If so, we got a selection of auditor and implementer training courses that might be relevant to you. Please click on any of the courses below to learn more about them.
ISO 45001 Training and Certification Course Options
If you have any questions, you may want to refer to our ISO 27001 course overview page where you can see some of our answers to frequently asked questions or contact us. We're always delighted to help. Note: Originally published in January 2020, this post has now been updated.
Related Courses
- ISO 27001 Internal Auditor for in-house auditing of your Information Security Management System
- ISO 27001 Lead Auditor for external auditing Information Security Management Systems.
- ISO 27001 Lead Implementer for the implementation and maintenance of an Information Security Management System