User error is minimizing the impact of massive financial investments in IT security today. Increasingly, businesses are investing more money in IT security. Yet, despite this, hackers are still finding vulnerabilities and hacking into business data.  Why? — Because of user errors.

Cybercriminals are stealing confidential data via social engineering. If even one of your employees gets a phishing email and opens it, downloads a pdf. file with malware attached, or visits a criminal’s website that’s disguised as a legitimate site, your business data is in jeopardy.

Multiple studies have reached the same conclusion.  Here’s what a few found regarding the percentage of IT security breaches caused by social engineering:

  • 95% according to IBM’s Security Services Cyber Security Intelligence Index Report.
  • 90% according to Online Trust Alliance.
  • 78% according to Verizon.

Even small and mid-sized businesses (SMBs) aren’t immune to security breaches:

  • 71% of breaches occurred in businesses with fewer than 100 employees (Verizon)
  • 60% of SMBs went out of business within 6 months of a data breach. (National Cyber Security Alliance)

You may have a fortress of IT security, but if you haven’t trained your employees to identify cyber threats, you’ve left the front door to your business wide open.

Plus, many regulations, insurance policies, compliances, and audits require policies and training that many SMBs don’t maintain.


This IT Security Training provides a portal that includes Online Training, a Monthly Newsletter, and Weekly Micro-Training.  You can track each employee’s training, what they’ve completed, and how they performed on tests.  Here’s what’s included:


  • Online Security Training (self-paced)
  • Weekly Micro-Training (2-minute video on active threats)
  • Monthly IT Security Newsletter


  • Online Certification Test
  • Periodic fake/simulated “Phishing Attacks”


  • Access to 10 IT Security Policies
  • Online tracking of policy acceptance


  • Online IT Security Portal for all resources
  • Executive Reports for tracking purposes

The CSP PII PROTECT portal also provides IT Policies that you can use and publish as is, or edit according to your needs.  Simply select the policies you want your users to adhere to when they take the online training:

Policy Templates include:

  • Written Information Security Policy
  • Termination Policy
  • Security Incident Response
  • Sanction Policy
  • Network Security Policy
  • Access Controls Policy
  • Computer Use Policy
  • Disposal Procedure Policy
  • BYOD Policy
  • Facility Security Plan Policy
  • Policy Acknowledgement

Pricing for PII PROTECT is based upon the number of users.

Don’t wait until your business in or around Raleigh gets hit with a costly Cyber Scam. For a demonstration, or more information about the CSP PII PROTECT Training Portal, contact Stephen Riddick, VP of Sales and Marketing at: 919-424-2019 or  

IT Companies in Raleigh

Download Our

IT Company in Raleigh

On What Questions You Need To Ask Before Signing Any Agreement.

Raleigh IT Support

Latest Tweets