{"id":8090,"date":"2024-08-15T16:42:11","date_gmt":"2024-08-15T16:42:11","guid":{"rendered":"https:\/\/www.nebrcentre.co.uk\/?p=8090"},"modified":"2024-08-15T16:42:11","modified_gmt":"2024-08-15T16:42:11","slug":"how-can-you-promote-cyber-security-awareness-in-the-workplace","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/how-can-you-promote-cyber-security-awareness-in-the-workplace\/","title":{"rendered":"How Can You Promote Cyber Security Awareness in the Workplace?"},"content":{"rendered":"\n<p>Cyber security is becoming more and more important in the modern online world. People have to be hyper-vigilant of potential threats and know how to mitigate the risks associated with these threats. That being said, some are more aware than others. So how do you promote cyber security in the workplace with a range of online literacy?&nbsp;<\/p>\n\n\n\n<p><strong>You can promote cyber security awareness in the workplace in a few key ways:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implementing policies and procedures<\/strong><\/li>\n\n\n\n<li><strong>Running data handling training<\/strong><\/li>\n\n\n\n<li><strong>Use of security tools<\/strong><\/li>\n\n\n\n<li><strong>Communicating a disaster recovery plan<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Read on to learn more about cyber security for businesses and how you can improve awareness of cyber security in your workplace.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Do You Promote the Importance of Cyber Security for Business?<\/h2>\n\n\n\n<p>Cyber threats are increasing daily and becoming ever more sophisticated, which is why it is so important to ensure that your employees are trained and confident in matters of cyber security. This is especially important for businesses that handle sensitive information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Cyber Security is Important<\/h3>\n\n\n\n<p>Cyber security awareness means that your employees will be able to identify a cyber threat and act appropriately to avoid risks. It includes a range of topics, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Being aware of the latest security threats<\/li>\n\n\n\n<li>Dangers of clicking on potentially malicious links<\/li>\n\n\n\n<li>Dangers of downloading potentially dangerous attachments<\/li>\n\n\n\n<li>Disclosing sensitive information<\/li>\n\n\n\n<li>Password best practice<\/li>\n<\/ul>\n\n\n\n<p>The goal of promoting cyber security in the workplace is to strengthen your organisation\u2019s online security, building a more resilient business in the modern world. Investing in cyber awareness training will give you peace of mind that your employees can recognise and safely handle threats before they become a problem, but also know what to do, should the worst happen.<\/p>\n\n\n\n<p>But how do you communicate the importance of this to employees? Younger and more technologically adept employees will likely already understand and know the basics, but how do you ensure <em>all <\/em>of your employees are on the same page?<\/p>\n\n\n\n<p>Learn more about this below, or access the <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/board-toolkit\" target=\"_blank\" rel=\"noreferrer noopener\">NCSC\u2019s Cyber Security Board Toolkit<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How to Communicate This in the Workplace<\/h3>\n\n\n\n<p>It\u2019s essential that your employees view cyber security as seriously as you do if you want to reap the benefits of it. Here are some of the top ways to improve cyber awareness and security in the workplace:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Policies and Procedures<\/h4>\n\n\n\n<p>Policies and procedures are essential for promoting cyber security across the workplace. They are the foundation of your online security culture and the bare minimum that employees should be doing. They are also useful for training new employees, compliance and day-to-day reference.<\/p>\n\n\n\n<p>Examples of policies and procedures you should have in place include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/safeguarding-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">Password policies<\/a><\/li>\n\n\n\n<li>Device usage policies<\/li>\n\n\n\n<li>Data handling policies<\/li>\n\n\n\n<li>Firewall rules<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Data Handling Training<\/h4>\n\n\n\n<p>If your team handles data, they need to be aware of the cyber security risks associated with it. This is sensitive information and should be treated seriously. Some of the areas your employes should be aware of include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data encryption<\/li>\n\n\n\n<li>Data destruction<\/li>\n\n\n\n<li>Secure remote access<\/li>\n\n\n\n<li>Wi-Fi network access<\/li>\n\n\n\n<li>Transfer\/sending of data<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Security Tools<\/h4>\n\n\n\n<p>Security tools can make all the difference when it comes to cyber security, therefore your team should be aware of and use some version of the following tools:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firewalls<\/li>\n\n\n\n<li>Anti-virus software<\/li>\n\n\n\n<li><a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/vulnerability-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vulnerability scanning<\/a><\/li>\n\n\n\n<li>File Integrity Monitoring<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Prepare Employees to Respond to a Crisis<\/h4>\n\n\n\n<p>It\u2019s not enough that your employees know how to reduce the risks of cyber threats; they also need to know what to do if the worst happens. The success of recovery after a breach depends on communication. If you have a recovery plan, but nobody knows about it, your team will spend a lot of time scrambling and figuring out what to do.&nbsp;<\/p>\n\n\n\n<p>The following considerations should be included in a<a href=\"https:\/\/www.ncsc.gov.uk\/collection\/10-steps\/incident-management\" target=\"_blank\" rel=\"noreferrer noopener\"> disaster recovery plan<\/a>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recovery time objective<\/li>\n\n\n\n<li>Hardware and software inventory<\/li>\n\n\n\n<li>Identify personnel roles<\/li>\n\n\n\n<li>List of disaster recovery sites<\/li>\n\n\n\n<li>Remote storage of physical documents and storage media<\/li>\n\n\n\n<li>Disaster response procedures<\/li>\n\n\n\n<li>Identification of sensitive data<\/li>\n\n\n\n<li>Define a communication plan<\/li>\n\n\n\n<li>Physical facility needs<\/li>\n\n\n\n<li>Running disaster recovery drills<\/li>\n<\/ul>\n\n\n\n<p>Learn more about cyber security for small businesses with the <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide\" target=\"_blank\" rel=\"noreferrer noopener\">NCSC\u2019s Small Business Guide<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay Up to Date With Cyber Security for Business With NEBRC<\/h2>\n\n\n\n<p>At NEBRC, we\u2019re a police-led not-for-profit organisation that\u2019s dedicated to your cyber security. We work closely with you to keep your data safe and reduce your risk of cyber attack.<\/p>\n\n\n\n<p>Visit our <a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/\" target=\"_blank\" rel=\"noreferrer noopener\">website <\/a>to find out more about our Network<a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/vulnerability-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\"> Vulnerability Assessments<\/a>, or to find out about our <a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/web-app-vulnerability-assessment\/\">Web app Vulnerability Assessment<\/a> to protect your website too. Or, why not sign up for our <a href=\"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/core-membership-sign-up\/\" target=\"_blank\" rel=\"noreferrer noopener\">Free Core Membership<\/a>, designed to provide you with relevant resources and ongoing support to improve your resilience to cyber security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is becoming more and more important in the modern online world. People have to be hyper-vigilant of potential threats and know how to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":8091,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-8090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/8090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/comments?post=8090"}],"version-history":[{"count":0,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/posts\/8090\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/media?parent=8090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/categories?post=8090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northeastcrc\/wp-json\/wp\/v2\/tags?post=8090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}