Analytics
12/12/2012
01:21 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Habits Of Highly Successful Security Awareness Programs

Report illustrates how challenging security awareness is for information security professionals

Pittsburgh, PA (PRWEB) December 11, 2012

Wombat Security Technologies (Wombat), a leading provider of cyber security awareness and training solutions, today announced the availability of a new research report by Ira Winkler and Samantha Manke from Internet Security Advisors Group (ISAG) entitled the "Habits of Highly Successful Security Awareness Programs: A Cross-Company Comparison." This new report is intended to help information security departments build effective security awareness and training programs with practical insights on how creative and interactive training methods can be used to increase participation and improve employee behavior modification rates.

"Many information security professionals charged with implementing security awareness programs struggle with outdated training approaches, internal opposition, lack of budget and loosely defined compliance guidelines," said Joe Ferrara, President and CEO of Wombat. "Our goal in sponsoring this report was to enable a more practical discussion around how to effectively build and maintain a security awareness training program that not only meets compliance requirements, but changes user behavior and delivers measurable return on investment."

The report illustrates how challenging security awareness is for information security professionals.

· 90% of the survey respondents were required to comply with at least one standard or regulation that required security awareness training

· 48% of survey respondents reported difficulty in receiving funds for their training programs

· 44% of respondents reported that they had a difficulty encouraging employees to take security seriously

· 65% reported that they created most of their own training materials despite the fact that many practitioners are not familiar with education or learning science principles that can enhance the effectiveness of programs

The new ISAG report uncovers multiple areas where real Fortune 500 companies are using new approaches to security awareness training to achieve better results. Topics include:

· How to obtain C-level support and budget for training programs

· Which departments are critical partners for program success

· How to use metrics to demonstrate positive results

· Why a 90-day program plan works better than a 1-year plan

· How to creatively disseminate materials to improve engagement

· What types of training materials and tools are most effective

A copy of "Habits of Highly Successful Security Awareness Programs: A Cross-Company Comparison " can be downloaded at http://www.wombatsecurity.com/habits_whitepaper.

About Wombat Security Technologies

Wombat Security Technologies helps organizations combat cyber security threats with uniquely effective software-based training solutions. Wombat offers fully automated, highly scalable software-based training solutions, built on learning science principles. They offer mock attacks with brief embedded training, as well as a full complement of 10-minute software training modules. Wombat's training solutions have been shown to reduce employee susceptibility to attack by up to 70%. Wombat is helping Fortune 1000 customers, large government agencies and small to medium businesses in segments such as finance, banking, higher education, retail, technology, energy, insurance, and consumer packaged goods strengthen their cyber security defenses. For more information visithttp://www.wombatsecurity.com or contact Lorraine Kauffman-Hall at 704-882-0443 or lhall(at)attainmarketing(dot)com.

About Internet Security Advisors Group

The Internet Security Advisors Group (ISAG) is a world leading security service firm providing strategic security services. ISAG specializes in providing security awareness services that are based on scientific principles, and can assist any company in creating better security awareness programs. Our security awareness managed service allows companies to outsource their security awareness efforts to experts, providing a security awareness program that is less expensive and more effective. For more information visit http://www.isag.com, call 410-544-3435 or email info(at)isag(dot)com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.