Download this poster, Top Five Lessons from the 2018 Security Awareness Report, which examines the challenges in managing human risk and the ways even the most mature awareness programs work to overcome those challenges.
Do you know where your organization falls on the Maturity Model? Download this complimentary poster, The Anatomy of a Successful Awareness Program, to identify the seven key steps toward building, maintaining, and measuring a mature security awareness program.
Every device you are connected to makes you increasingly more vulnerable to a cyber attack. Cyber criminals can quickly target you and your valuable information for their personal gain if given the opportunity. Review this poster to educate you, your organization, and even your family members to better understand the methods a cyber criminal may take to hack into your mobile device or computer. The information in this poster could provide you with the steps to become less vulnerable in the future and actively engage people in your security awareness program. This poster is based on the original work of Brian Krebs.
This poster teaches people how to identify phishing and spear phishing emails. It provides an example of a common phishing email and the most common indicators that it is an attack. This poster was created as a community project based on input from numerous individuals and organizations.
This poster walks you through step-by-step how to build an engaging, high-impact security awareness program. Included are templates, checklists and documents that provide everything you need to plan, maintain and measure your program.
This poster walks families through the five key steps on how to create a cyber secure home. What makes this poster so powerful, is these are also the very same secure behaviors that most organizations want employees to exihibit at work.
This poster identifies and explains different reasons why and how cyber attackers will target Industrial Control Systems / SCADA networks. This is an excellent awareness resource for critical infrastructure.
This poster explains to healthcare professionals what healthcare data is, why it needs to be protected, where its located, and top tips on how to secure it. If your organization handles PHI this is a great resource to assist in your security awareness program.