5
The Need for a Security Awareness Program R

The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

The Need for a Security Awareness Program

R

Page 2: The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

Symantec™ Security Awareness ProgramMitigate information risk by educating your employees

Data Sheet: Symantec Education Services

The need fThe need for Securitor Security Ay Awarenesswareness

Today, you need to protect not only against traditional

security threats like hacking and exploitation of software

vulnerabilities, but also against risks related to data breaches

caused by internal negligence, and damage resulting from

outside attacks targeted at your mobile devices. The best

method of defense against these security threats is security

awareness training. In addition, compliance and governance

regulations, like the Sarbanes-Oxley Act and the Payment

Card Industry Data Security Standard, mandate such training.

Negligent employees are the most common causes of data

breach; theft or loss of a computer, mobile device or other

medium on which data is stored or transmitted accounted for

thirty-four percent of data breaches and information

accidentally made public accounted for 24 percent in 20111.

Companies paid an average of $5.5M per data breach in 2011.

A top preventative measure aimed at reducing this is

employee training and awareness programs.

Major Causes of Data BreachesMajor Causes of Data Breaches2

Major causes of data breaches

The need for proper training, IT policy development, and

continuous education is amplified by evolving technology

trends and the resulting security threats. For example,

companies are seeking the proper balance between social

media's advantages and the dangers posed by increased

exposure of potentially sensitive information. Organizations

that allow employees to utilize social media in the workplace

need to develop comprehensive best practices and an IT policy

to protect employee privacy as well as company data.

A poorly trained workforce significantly increases the risk of

loss and disclosure of vital data such as social security

numbers, bank account details, and corporate IP. The

immediate costs of these losses—the size of fines and

compensation to individuals—grab the headlines. But the

largest impacts are the loss of reputation and trust, damage to

an organization's brand, and erosion of its customer base.

Security-conscious companies realize that an effective

security awareness program that touches all employees is as

important as your firewall in defending against data breaches.

Because such breaches can be addressed with training in

appropriate security behavior, most Government standards,

regulations, and laws covering corporate governance, privacy,

and security best practices mandate that organizations

provide employee security awareness training and show

evidence thereof for compliance audits.

Symantec™ Security Awareness Program overview

Symantec supports a risk management approach to help

organizations mitigate risk through an effective security

awareness program. The program:

• Promotes proactive employee behavior to better protect

information

• Meets regulatory requirements specific to employee

security awareness training

1.

2.

Ponemon Institute, LLC 2011 Annual Study, "U.S Cost of Data Breach"Image data source: Norton Cybercrime Report, 2011

1

Page 3: The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

⁃ Provides comprehensive Web-based training (WBT) with

pre- and post-assessment to measure employee

understanding

⁃ Promotes retention with multiple communication tools

⁃ Offers customization services to meet specific company

needs and goals

WWeb-based Teb-based Trainingraining

The Symantec™ Security Awareness Program provides a

programmatic approach that includes comprehensive Web-

based training and communication tools to help companies

meet regulatory requirements specific to employee security

awareness training. This can help reduce vulnerabilities by

creating an informed corporate culture, to influence

employees to protect an organization’s critical information

assets from exploitation, cyber-attacks, unauthorized access,

and fraud. The program is designed not only to increase

security knowledge and understanding, but also to influence

appropriate employee behavior at all levels.

The Web-based training describes the importance of

information security, promotes the understanding of

information security principles, the awareness and reality of

threats and vulnerabilities, and the application of security

best practices to your environment.

LLessons in the Wessons in the Web-based training include:eb-based training include:

LLesson 1: Infesson 1: Information securitormation security, responsibilities, andy, responsibilities, and

principlesprinciples—Defines information security, explains why it’s

important, who is responsible, and how to classify and

respond to incidents.

LLesson 2: Threats, vulnerabilities, andesson 2: Threats, vulnerabilities, and

countermeasurescountermeasures—Provides an awareness of the threats and

vulnerabilities to which information is subject along with the

countermeasures, as well as the objectives and techniques

used by hackers to gain information.

LLesson 3: Securing your working enesson 3: Securing your working environmentvironment—Identifies

security best practices and how to apply them in the

workplace and in home offices. Also covers securing

passwords and emails, and exchanging information securely.

LLesson 4: Securitesson 4: Security while tray while travelingveling—Describes how to secure

communications when on-the road, including what to do

before you leave, how to maintain security while on the move,

and in offsite locations.

LLesson 5: Proesson 5: Protecting inftecting information on theormation on the

InternetInternet—Demonstrates how to protect information in the

cloud, increases awareness of advanced persistent threats

and provides web browser best practices.

LLesson 6: Social media awarenessesson 6: Social media awareness—Explains the benefits

and risks of social media and how to use it safely.

LLesson 7: Mobile device securitesson 7: Mobile device securityy—Covers mobile device

threats, safety and best practices, as well as "bring-your-own-

device" threats, safety and policies.

The following modules are available separately:

PCI-DPCI-DSSSS—Describes the Payment Card Industry Data Security

Standard requirements that must be enforced when a Primary

Account Number (PAN) is stored, processed, or transmitted,

regardless of the media. Most organizations that handle credit

cards for payment will need to adhere to this standard.

HIPHIPAAA and HITEA and HITECHCH—Introduction to the security and privacy

requirements of medical patient information, including

procedures for protecting patient data, types of violations and

reporting requirements, and resources to assist with HIPAA-

and HITECH-related privacy and security matters.

InfInformation Privormation Privacacyy – Defines personal information,

describes how personal information is collected and used, and

illustrates best practices for maintaining the security of

personal information.

Each Web-based training module concludes with an

assessment to measure employee understanding. The

trainings are available in Shareable Content Object Reference

Module (SCORM) compliant training modules that are ready to

be published to an organization’s SCORM 1.2 compliant

Learning Management System (LMS) for tracking, reporting,

and audit purposes.

Data Sheet: Symantec Education ServicesSymantec™ Security Awareness Program

2

Page 4: The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

Communications materials

An effective security awareness program requires on-going

communications to help reinforce knowledge received from

the trainings. Communication materials provided with in the

Security Awareness Program include:

• Ready to print posters (11’’x17’’ and 2’x3’ sizes)

• Ready to print reminder cards

• Email templates to remind employees of the security best

practices

• Short animated videos

Customization services

Symantec provides flexible content customization services to

tailor the content to your organization’s specific needs,

including branding the content with your logo. Customers can

modify the additional resource link in the training modules to

reference their own security policies and procedures and

other relevant information.

Why Symantec™ Education for security awareness

training

A successful security awareness program influences attitudes

and behavior. It instills and reinforces security best practices

so that they become habitual in daily tasks and interactions. It

must:

• Promote employee awareness that they are responsible for

organizational security.

• Teach the security principles for which employees are

responsible.

• Raise employee awareness of the threats to which the

organization is vulnerable.

• Teach how to apply the security principles to everyday

tasks.

• Remind, refresh, and update the security principles and

best practices learned.

As a recognized global leader in security intelligence and

security training, Symantec is uniquely positioned to help

organizations raise security awareness. The Symantec

Security Awareness Program was developed by professionals

with backgrounds in instructional design and security best

practices. This combination of expertise ensures both content

quality and instructional presentation that maximizes learning

and retention. In addition, Symantec™ Education leverages

data and trends from its Global Intelligence Network to

constantly improve the content of the program, such as best

practices when using social media.

Why Symantec

Symantec’s position as the industry leader in security is the

result of 25 years of research, development, and delivery of

market leading technologies in use by 100 percent of the

Fortune 500.3Symantec is recognized as a technology and

market share leader in over a dozen categories by Gartner,

Forester, and IDC. Symantec holds over 1,200 patents in its

global patent portfolio. Symantec's Global Intelligence

Network:

• Holds more than 40,000 vulnerabilities in the Symantec

vulnerability database

• Has five million decoy accounts in the Symantec Probe

Network

• Scans 30 percent of the world’s email traffic

• Gathers malicious code data from 133 million systems

Symantec’s unmatched global intelligence of the evolving

security threats and trends serves as the foundation for its

products and services.4

More Information

Visit our webVisit our websitesite www.symantec.com/training

TTo speak with a Product Specialiso speak with a Product Specialistt in the U.S. or Canadain the U.S. or Canada

Call toll-free 1 (800) 327-2232 (option 4)

or in Canada at (416) 774-0045 or

email [email protected]

3.

4.

Ponemon Institute, LLC 2011 Annual Study, "U.S Cost of Data Breach"Symantec Corp., based on Fortune 1000 ranking, May 3, 2010

Data Sheet: Symantec Education ServicesSymantec™ Security Awareness Program

3

Page 5: The Need for a · The Web-based training describes the importance of information security, promotes the understanding of information security principles, the awareness and reality

4

To speak with a Product Specialist outside the U.S.

For speci�c country o�ces and contact numbers, please visitour website Email:

Europe, Middle East & Africa [email protected]

Asia, Paci�c, Japan - [email protected]

About Symantec

Symantec protects the world’s information, and is a globalleader in security, backup, and availability solutions. Ourinnovative products and services protect people andinformation in any environment – from the smallest mobiledevice, to the enterprise data center, to cloud-based systems.Our world-renowned expertise in protecting data, identitiesand interactions gives our customers con�dence in aconnected world. More information is availableat www.symantec.com or by connecting with Symantecat: go.symantec.com/socialmedia

Symantec World Headquarters

350 Ellis St. | Mountain View, CA 94043 USA+1 (650) 527 8000 | 1 (800) 721 3934 | www.symantec.com

About

Consistent Quality Delivery - Every Time - No Excuses

Mission

We develop strong partnerships with our customers by delivering quality products and services that produce increased performance and manageability, while yielding measurable results at reduced costs. We will remain focused on customer satisfaction at every touch point, while safely generating value for our shareholders.

Description

Website: www.jcmr.netLinkedIn: www.linkedin.com/company/jcmr-technologyTwitter: www.twitter.com/jcmrtechnology

We focus on differentiation through ITSM and only providing solutions that our customers need. We take the time to help our customers understand the more important underpinning problems that are causing or may lead to IT infrastructure service degradation such as lack of Asset Management, Change Management, Configuration Management, undefined Help Desk procedures, etc.

R