{"type":"document","data":{"id":"627ed9f8-00c5-4661-9406-0a6d39c2436e","localeString":"en-GB","publishDate":"2024-12-10T13:57:58.663+01:00","contentType":"onecms:editorialPage","hasMacro":false,"flexPageMetadata":{"afmBanner":false,"robotInstruction":{"noIndex":false,"noFollow":false},"description":"Raising employee awareness about online security is essential to reduce risks and protect confidential company data."},"mainHeaderZone":{"componentType":"editorialHeader","coreHeader":{"title":"Raise awareness about cyber security among your employees and key players within your organisation","body":"Over 90% of attacks on companies are phishing attacks that go through an employee. Raising employee awareness about online security is essential to reduce risks and protect confidential company data."},"backLink":{"textLink":{"url":"/en/business/news/secure-business","text":"secure business"}},"date":"2024-12-10","readingTime":6},"flexZone":{"flexComponents":[{"componentType":"highlight","title":"Take control of your cybersecurity with the help of our experts.","richBody":{"value":"<p>Alexandre Pluvinage is Head of anti-fraud and online security awareness at ING Belgium. During a full day of intense training, he will teach you the basics of cybersecurity and the communication techniques linked to behavioural change. You will draft your first annual awareness plan and your first communication campaign. Download <a href=\"https://assets.ing.com/m/462df9113dad9d88/original/Info-leaflet-cybersecurity-for-employees_ENG.pdf\">our leaflet</a> for more details.</p><p><a href=\"https://www.ing-events.be/cyberawareness25/nl/registration\">Register now</a></p>"},"textLinks":[{"url":"/en/business/news/secure-business/business-trainings","text":"All the information on our cybersecurity trainings for companies"}]},{"componentType":"sectionTitle","title":"Train all employees in the basics of cyber security"},{"componentType":"paragraph","richBody":{"value":"<p>Regular employee training is a crucial step in strengthening online security.  </p><p>Key points to bear in mind:  </p><ul><li><p>Raise awareness about threats: Inform your employees about the different forms of online attack, such as phishing and malware. </p></li></ul><ul><li><p>Explain the potential impact of these threats on the company and the measures to be taken to avoid them.  </p></li><li><p>Good security practices: Emphasise the importance of creating strong passwords, using two-factor authentication, keeping software up to date and not downloading files or clicking on suspicious links.  </p></li><li><p>Simulated attacks: Organise drills with simulated attacks to test employees&apos; knowledge of online security. This helps raise awareness and identify areas that need further attention. </p></li></ul>"}},{"componentType":"sectionTitle","title":"Train the company's key players"},{"componentType":"paragraph","richBody":{"value":"<p>In addition to raising employee awareness, it is crucial to identify the key people within your company who should play an active role in online security:  </p><ul><li><p>Management: Company management must set an example by respecting best practices in online security. They should actively support awareness-raising initiatives and allocate the necessary resources to cyber security.  </p></li><li><p>Information Security Officer: Appoint a person to be responsible for information security within your company. This person should oversee security measures, coordinate training and establish protocols in the event of an incident.  </p></li></ul><ul><li><p>IT team: IT professionals play a crucial role in protecting the company’s systems and data. They should put security measures in place, monitor suspicious activity and be available to respond to employees&apos; questions and concerns. </p></li></ul>"}},{"componentType":"sectionTitle","title":"Ongoing training and encouragement"},{"componentType":"paragraph","richBody":{"value":"<p>Raising awareness about online security must be an ongoing process, integrated into the company&apos;s culture.  </p><p>The basic principles of this type of training are:  </p><ul><li><p><strong>Regular communication:</strong> Provide regular updates on new threats and best practices in online security. Use different communication channels such as newsletters, posters or emails to reach all employees.  </p></li><li><p><strong>Recognition and awards:  </strong>Encourage employees to adopt secure online behaviour by acknowledging their efforts. This can include rewards or special citations for reporting potential security problems or following security procedures in an exemplary manner.  </p></li><li><p><strong>Ongoing training:</strong> Offer ongoing training opportunities to keep employees up to date with the latest security innovations and expand their knowledge. </p></li></ul>"}},{"componentType":"sectionTitle","title":"Example of a cyber security training plan"},{"componentType":"paragraph","richBody":{"value":"<p>This schedule covers a three-month period, but you can adjust it according to your company&apos;s needs and resources: </p>"}},{"componentType":"paragraph","title":"Month 1","richBody":{"value":"<p>Week 1: </p><ul><li><p><strong>General awareness session: </strong>Organise an awareness-raising meeting for all employees, explaining the main online security risks and the best practices to adopt. </p></li></ul><p>Week 2: </p><ul><li><p><strong>Password management training: </strong>Organise a training session on how to create strong passwords and implement secure login management. Stress the importance of using unique passwords for each account. </p></li></ul><p>Week 3: </p><ul><li><p><strong>Phishing awareness:</strong> Phishing training using material on Safeonweb.be (<a href=\"https://surfersanssoucis.safeonweb.be\">https://surfersanssoucis.safeonweb.be</a>). It is advisable (although not compulsory) to carry out a phishing attack simulation exercise to test employees&apos; knowledge and ability to detect suspicious emails before and then after the training. The results can be used to stimulate your employees. </p></li></ul><p>Week 4: </p><ul><li><p><strong>Malware awareness: </strong>Explain the different types of malware and the associated risks. Provide advice on prevention, such as installing antivirus software and checking sources before downloading files. </p></li></ul>"}},{"componentType":"paragraph","title":"Month 2","richBody":{"value":"<p>Week 1: </p><ul><li><p><strong>Two-factor authentication (2FA) training: </strong>Explain the benefits of two-factor authentication and show employees how to activate this feature on their work and personal accounts. </p></li></ul><p>Week 2: </p><ul><li><p><strong>Raising awareness about mobile device security: </strong>Focus on the risks associated with mobile devices, such as lost or stolen mobile phones. Provide advice on securing devices, such as using PIN codes or biometric locking features. </p></li></ul><p>Week 3: </p><ul><li><p><strong>Wireless network security training: </strong>Explain the risks associated with public Wi-Fi networks and provide advice on securing the Internet connection when using unsecured networks. </p></li></ul><p>Week 4: </p><ul><li><p><strong>Raising awareness about the need to protect sensitive data:</strong> Inform employees about data confidentiality and best practices for protecting sensitive company and customer information. </p></li></ul>"}},{"componentType":"paragraph","title":"Month 3","richBody":{"value":"<p>Week 1: </p><ul><li><p><strong>Social media security training: </strong>Highlight the risks associated with the use of social media, such as the excessive sharing of personal information or the disclosure of confidential professional data. Provide advice on protecting privacy online. </p></li></ul><p>Week 2: </p><ul><li><p><strong>Security incident response drill: </strong>Organise a security incident simulation drill to test employees&apos; responsiveness in the event of an attack or data breach. Assess procedures and identify areas for improvement. </p></li></ul><p>Week 3: </p><ul><li><p><strong>Closing session and reminder:</strong> Summarise the main points covered in the previous sessions. Thank employees for their active participation and stress the ongoing importance of online security. </p></li></ul><p>Week 4: </p><ul><li><p><strong>Knowledge management: </strong>Administer an online test or assessment to assess employees&apos; knowledge of online security. This will enable you to measure the effectiveness of awareness-raising and identify areas where further action may be required. </p></li></ul>"}},{"componentType":"highlight","richBody":{"value":"<p>Raising awareness about online security is an ongoing process. It is important to plan regular reminders, updates and additional training to maintain a high level of awareness and preparedness in the face of constantly shifting threats. </p>"}}]},"complementaryZone":{"flexComponents":[{"componentType":"sectionTitle","title":"Also interesting !"},{"componentType":"cards","cards":[{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Your company and the NIS2 Directive","body":"Is your company subject to NIS2 and what does this mean?","image":{"transformBaseUrl":"https://assets.ing.com/transform/31ab1391-5af1-4c56-bac5-2bce3d7fc151/closedlock2","type":"image","width":160,"original":"https://assets.ing.com/m/72091172e72f6ae6/original/closedlock2.svg","extension":"svg"},"date":"2024-07-25","link":{"url":"/en/business/news/secure-business/my-company-and-nis2"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Protect your company against cybercriminals? Yes, you can!","body":"Follow our cybersecurity trainings and close the door to cybercriminals","image":{"transformBaseUrl":"https://assets.ing.com/transform/9b6efb10-8f60-41f5-bac3-5e4e15706ac1/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass","type":"image","width":5200,"altTextEN":"\"\"","altTextNL":"\"\"","altTextFR":"\"\"","altTextDE":"\"\"","original":"https://assets.ing.com/m/6dbf2299c845b8ad/original/Silhouette-of-a-business-man-walking-along-a-passage-with-green-trees-reflecting-in-the-glass.jpg","extension":"jpg"},"date":"2024-03-20","link":{"url":"/en/business/news/secure-business/business-trainings"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Corporate cyber hygiene","body":"Provide the necessary IT-security to your organisation","image":{"transformBaseUrl":"https://assets.ing.com/transform/0443f2bf-bf50-4e13-b816-c139ff25ed6c/Keys-on-a-board","type":"image","width":3872,"original":"https://assets.ing.com/m/4f0a0c82c1ad42b1/original/Keys-on-a-board.jpg","extension":"jpg"},"date":"2023-08-09","link":{"url":"/en/business/news/secure-business/business-cyber-hygiene"}},{"componentType":"articleCard","cardType":"article","cardSize":"medium","title":"Cybersecurity reaction plan","body":"Limit the impact of a cyber-attack","image":{"transformBaseUrl":"https://assets.ing.com/transform/7997b036-5928-410a-ac3b-0469bec6d9ae/SIDE-VIEW-OF-A-MAN-WORKING-IN-THE-MIRROR","type":"image","width":6602,"altTextNL":"\"\"","original":"https://assets.ing.com/m/5ea7bb912077e52a/original/SIDE-VIEW-OF-A-MAN-WORKING-IN-THE-MIRROR.jpg","extension":"jpg"},"date":"2023-08-10","link":{"url":"/en/business/news/secure-business/business-reaction-plan"}}]}]}}}