On What Questions You Need To Ask Before Signing Any Agreement.
User error is minimizing the impact of massive financial investments in IT security today. Increasingly, businesses are investing more money in IT security. Yet, despite this, hackers are still finding vulnerabilities and hacking into business data. Why? — Because of user errors.
Cybercriminals are stealing confidential data via social engineering. If even one of your employees gets a phishing email and opens it, downloads a pdf. file with malware attached, or visits a criminal’s website that’s disguised as a legitimate site, your business data is in jeopardy.
Multiple studies have reached the same conclusion. Here’s what a few found regarding the percentage of IT security breaches caused by social engineering:
95% according to IBM’s Security Services Cyber Security Intelligence Index Report.
90% according to Online Trust Alliance.
78% according to Verizon.
Even small and mid-sized businesses (SMBs) aren’t immune to security breaches:
71% of breaches occurred in businesses with fewer than 100 employees (Verizon)
60% of SMBs went out of business within 6 months of a data breach. (National Cyber Security Alliance)
You may have a fortress of IT security, but if you haven’t trained your employees to identify cyber threats, you’ve left the front door to your business wide open.
Plus, many regulations, insurance policies, compliances, and audits require policies and training that many SMBs don’t maintain.
THE SOLUTION—PII PROTECT from CSP
This IT Security Training provides a portal that includes Online Training, a Monthly Newsletter, and Weekly Micro-Training. You can track each employee’s training, what they’ve completed, and how they performed on tests. Here’s what’s included:
IT SECURITY TRAINING
Online Security Training (self-paced)
Weekly Micro-Training (2-minute video on active threats)
Monthly IT Security Newsletter
IT SECURITY TESTING
Online Certification Test
Periodic fake/simulated “Phishing Attacks”
IT POLICIES and PROCEDURES
Access to 10 IT Security Policies
Online tracking of policy acceptance
MANAGEMENT & ADMINISTRATION
Online IT Security Portal for all resources
Executive Reports for tracking purposes
The CSP PII PROTECT portal also provides IT Policies that you can use and publish as is, or edit according to your needs. Simply select the policies you want your users to adhere to when they take the online training:
Pricing for PII PROTECT is based upon the number of users.
Don’t wait until your business in or around Raleigh gets hit with a costly Cyber Scam.For a demonstration, or more information about the CSP PII PROTECT Training Portal, contact Stephen Riddick, VP of Sales and Marketing at: 919-424-2019 or email@example.com