11192122 - Cybersecurity Training Book

THINGS TO CONSIDER

 User training – do users know what suspicious emails look like? Are you sure?  User reporting – do users know how to report an email? Are you sure?  Alerting and analysis – are there systems in place to notify IT of impending doom?  Know your network – do you know what is accessible from each device?

Inventory, heuristics

 ADKAR – five tangible and concrete outcomes that people need to achieve for lasting change

 AWARENESS of the need for change

DESIRE to support the change

 KNOWLEDGE of how to change

 ABILITY to demonstrate skills and behaviors  REINFORCEMENT to make the change stick

Made with FlippingBook - Online catalogs