Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    • IBM Think 2022 – Embracing the Present, Preparing for the Future
    • A Game of Numbers: The Correlation Between Technology and Sports Betting
    • Software-based Enterprise Solutions for Navigating the “Too Much Information” Age
    • A Look At The Last Generation Of Internal Combustion Engines
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 15, 2022

      A Look At The Last Generation Of Internal Combustion Engines

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

      May 14, 2022

      Ransomware is Indiscriminatory – Prepare for Everything to Fail

      May 5, 2022

      Cybersecurity Myths that are Compromising Your Data and How to Address Them

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

      May 14, 2022

      Apple vs. Dell: Choosing Which Company to Work For

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

      May 18, 2022

      Software-based Enterprise Solutions for Navigating the “Too Much Information” Age

    TechSpective
    You are at:Home»Security»Security Awareness»Why Continuous, Long-Term Security Awareness Training Will Build Tomorrow’s Cybersecurity Champions
    cybersecurity security awareness training education
    Image from Pixabay

    Why Continuous, Long-Term Security Awareness Training Will Build Tomorrow’s Cybersecurity Champions

    0
    By Mike Polatsek on July 24, 2019 Security Awareness, Training

    Back in 2003, a Swiss tennis player named Roger Federer won his first grand slam title – the prestigious Wimbledon championship. Federer has since won more than 100 ATP titles, making him one of the most accomplished tennis players in history – thanks in large part to his training.

    From the early days of his career to this very day, Federer has implemented a 10-hour daily training regimen. He calls it “a lifelong plan” and without it – experts claim – none of his shots would have looked like the ‘famous Federer shot’ that tennis enthusiasts around the world consider nothing less than astounding.

    Steph Curry fulfilled his childhood dream and was drafted to the NBA in 2009. In 2014, Curry won the NBA Most Valuable Player Award and led the Golden State Warriors to their first championship since 1975. He has since won multiple awards, broke dozens of scoring records and led his team to multiple NBA Championships. Curry said in a number of interviews: “There are no days-off in my practice routine. I’m always working on my game, always trying to get better”.

    Both leading athletes implement a continuous, dynamic training approach. They acknowledge that staying at the top means constantly evolving their training routine per their changing goals and physical abilities.

    4 Reasons Why to Implement a Long-Term Training Regimen

    Training for excellence means chasing a moving target. With each accomplished milestone, a higher and more challenging goal is created.

    Organizations need to train 100% of the workforce year-round using a smart, adaptive methodology. The longer you keep an effective security awareness training program running, the better your employees respond when faced with phishing attacks, minimizing risk and keeping your organization ahead of the curve.

    Here’s why:

    1. Aim for more

    When aiming for success, ’good’ is simply not ‘good enough’. Just like in athletics training regimen, an effective cyber security awareness training program helps employees build ‘anti-phishing muscles’ and sharpen instincts to immediately identify malicious emails when those slip through their mailbox. The more frequent employees’ practice, the faster they improve. While the largest KPI improvements are naturally noticed within the first 6-12 months, a steady improvement will continue to manifest even after 36 months.

    2. Use it or lose it

    We live in the information age and forget things faster than we are willing to admit. The simplest way to remember important things is to get them to the “top of the list” regularly. Our research shows that an average of 12 “reminders” a year is just the right amount to keep employees aware without overwhelming them.

    3. Stay ahead of the curve

    Hackers are never idle; Phishing attacks constantly evolve and become more sophisticated, aiming to target employees at their most vulnerable moments. ‘Staying in shape’ means studying your new opponents and knowing what you’re up against – an essential practice to avoid falling prey to new phishing schemes.

    4. Be all-inclusive

    Modern enterprises experience high employee mobility from outside and within the organization. Just like adding new players to a sports team, if new hires lag behind their peers’, the team is weaker. The longer an enterprise delays new employee security awareness training, the higher the risk for the organization.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleGeorgia Weidman Discusses Penetration Testing and Running a Successful Cybersecurity Business
    Next Article Tulsi Gabbard May Have Just Killed Social Media
    Mike Polatsek
    • Website
    • LinkedIn

    As a leader and co-founder of CybeReady, Mike Polatsek is part visionary, part team coach; he challenges everyone to succeed and enables them to exceed their own expectations. His deep knowledge of cyber security training informs his approach to all aspects of the business—from research and development to sales and marketing to customer acquisition and retention.

    Related Posts

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Security Automation Cuts Down Expenses and Saves Time for IT Teams

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    May 15, 2022

    A Look At The Last Generation Of Internal Combustion Engines

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Adobe
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    PopSpective
    Coffee and Politics
    PopSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    PopSpective

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.