SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Security Awareness Content Examples
Communication tools that broadcast visual content
   directly onto the screens of computers,
      using multiple channels and formats




                                           INFO FOR YOU….INFO FOR Y




     Easy to install. Easy and quick to use.
   Measure delivery, click-throughs, responses.
Visual Message Types and Suggested
Security Awareness Uses
Screensavers            Tickers          Alerts        Interactive       Surveys        Magazine


                                                               4.
                                                            Critical
  Screensavers          Ticker Bar     Pop-up Alert   Notifications to
                                                             Forums        Staff Poll    Magazine
                                                          IS teams,
                                                       critical breach
                                                         notices to
                                                            users.
                                                           Drive up
Desktop Wallpaper       RSS Feeds      Pop-up RSVP            Blogs
                                                           Training       Staff Quiz
                                                        participation
                                                      and customize
       1.                  3.                                                 2.
                                                      through RSVP.
   Reinforce           Drive fast                                         Measure
                                                         Showcase
  knowledge,          action when                                      understanding,
                                       Pop-up Video   dynamic video
                                                            Helpdesk
 learning over         processes                                       actions taken,
                                                        training/SA
     time              change or                                           training
                                                           content
                    action required                                    effectiveness.
                                                      through Video.
                     (compliance,
                     cut overs, roll
                         outs).                            Q&A
Screensavers




•   Reinforce data security behaviors through visual reminders
•   Change behavior and impart knowledge over time
•   Easily change out content items with no network impact
•   Target multiple messages to appropriate audiences
•   Enable Links and drive people to more info online, quizzes,
    audits, interactive forums on security awareness
SECURITY AWARENESS TIP # 5: Log out before you leave.




                                                        Did I log
                                                          out?
How Do they work?
      1. Upload your content to the Content
         Manager as a new screensaver
         message
      2. Choose your Target Audience
      3. Set display duration and other options
      4. “Publish” out to your audience
      5. Your message now cycles on their
         computer during screen saver mode,
         together with any other active
         screensaver
         targeted to them




Screensavers
LOCK
YOUR LAPTOP!
Keep your laptop secure by:
1.   Use Unique and secure passwords
2.   VPN daily (so virus protection updates run)
3.   Don’t open unknown attachments
Tips: Creating easy-to-remember,
strong passwords (click here)
Is your
                                                        password
                                                        your pet’s
                                                        name?
                                                        CHANGE IT NOW!

Check out the 10 things you should do to keep information secure (click anywhere)
Is your
password
your pet’s
name?
CHANGE IT NOW!

Check out the 10 things you should do to keep information secure (click anywhere)
SECURITY AWARENESS TIP – APRIL 2012




                                      Which kind of security breaches
                                      present the biggest risk?
                                            a. Malware infection
                                            b. Lost or stolen laptop
                                            c. Account compromise
                                            d. Weak passwords
                                            e. None of the above

                                      Test your knowledge!
                                      Click here to take our short quiz
Desktop wallpaper




• Cycle multiple messages during the day as wallpaper
• Reinforce key behaviors over time
• Target different visuals to retail, corporate, customer-facing
  vs internal devices
Pop-up Quizzes and Surveys




• Survey to understand current behaviors
• Quiz to reinforce best practice and measure understanding
• Visual delivery and auto-reminders ensure high
  response rates
• Send to smaller employee sample groups more often
  and still get statistically relevant data
Ticker/RSS Scroll




• Ensure audiences seek critical messages in time
• Target messages to everyone or just to specific employee
  groups involved
• Drive fast action when processes change or action required
  (compliance, cut overs, roll outs)
Link a Ticker Headline to a URL –
when your audience clicks on the
headline, it will launch the page and
take them to the information you
need them to see or act upon.
Pop-Up Alert Notifications




• Ensure audiences seek critical messages in time
• Target messages to everyone or just to specific employee
  groups involved
• Drive fast action when processes change or action required
• Showcase video tips, messages, content
• Increase Event/Training registrations
Send a dynamic pop-up alert and have it
automatically return later, if not actioned.
Visual Message Types and Suggested
Security Awareness Uses
Screensavers            Tickers          Alerts        Interactive       Surveys        Magazine


                                                               4.
                                                            Critical
  Screensavers          Ticker Bar     Pop-up Alert   Notifications to
                                                             Forums        Staff Poll    Magazine
                                                          IS teams,
                                                       critical breach
                                                         notices to
                                                            users.
                                                           Drive up
Desktop Wallpaper       RSS Feeds      Pop-up RSVP            Blogs
                                                           Training       Staff Quiz
                                                        participation
                                                      and customize
       1.                  3.                                                 2.
                                                      through RSVP.
   Reinforce           Drive fast                                         Measure
                                                         Showcase
  knowledge,          action when                                      understanding,
                                       Pop-up Video   dynamic video
                                                            Helpdesk
 learning over         processes                                       actions taken,
                                                        training/SA
     time              change or                                           training
                                                           content
                    action required                                    effectiveness.
                                                      through Video.
                     (compliance,
                     cut overs, roll
                         outs).                            Q&A
Customers include:
Security Awareness Content Examples

Weitere ähnliche Inhalte

Was ist angesagt?

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesKellep Charles
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptxsaaaatt
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk Splunk
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesRecorded Future
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 

Was ist angesagt? (20)

SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Security Testing for Web Application
Security Testing for Web ApplicationSecurity Testing for Web Application
Security Testing for Web Application
 
The Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best PracticesThe Security Vulnerability Assessment Process & Best Practices
The Security Vulnerability Assessment Process & Best Practices
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
IoT Security proposal.pptx
IoT Security proposal.pptxIoT Security proposal.pptx
IoT Security proposal.pptx
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Threat Hunting with Splunk
Threat Hunting with Splunk Threat Hunting with Splunk
Threat Hunting with Splunk
 
Proactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor TypesProactive Defense: Understanding the 4 Main Threat Actor Types
Proactive Defense: Understanding the 4 Main Threat Actor Types
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
IT Infrastrucutre Security
IT Infrastrucutre SecurityIT Infrastrucutre Security
IT Infrastrucutre Security
 

Ähnlich wie Employee security awareness communication

May2010 cq53-worldwide-tour
May2010 cq53-worldwide-tourMay2010 cq53-worldwide-tour
May2010 cq53-worldwide-tourdaysoftware
 
Make Better Decisions!
Make Better Decisions!Make Better Decisions!
Make Better Decisions!Hiten Shah
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santossantosomar
 
Kony-Forrester Webinar: The Evolution of Mobile First Development
Kony-Forrester Webinar: The Evolution of Mobile First DevelopmentKony-Forrester Webinar: The Evolution of Mobile First Development
Kony-Forrester Webinar: The Evolution of Mobile First DevelopmentKony, Inc.
 
Discovery delivery 中国软件技术大会2011
Discovery delivery 中国软件技术大会2011Discovery delivery 中国软件技术大会2011
Discovery delivery 中国软件技术大会2011Qiao Liang
 
Insider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM EditionInsider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM EditionMatt Holitza
 
The Evolution and Future of Business Video
The Evolution and Future of Business VideoThe Evolution and Future of Business Video
The Evolution and Future of Business VideoMediaPlatform
 
Lean Strategies for IT Support Organizations
Lean Strategies for IT Support OrganizationsLean Strategies for IT Support Organizations
Lean Strategies for IT Support OrganizationsRoger Brown
 
Unlocking High Impact Go To Market - V3 Exposed
Unlocking High Impact Go To Market - V3 ExposedUnlocking High Impact Go To Market - V3 Exposed
Unlocking High Impact Go To Market - V3 ExposedKen Rutsky
 
The Laws of User Experience: Making it or breaking it with the UX Factor
The Laws of User Experience: Making it or breaking it with the UX FactorThe Laws of User Experience: Making it or breaking it with the UX Factor
The Laws of User Experience: Making it or breaking it with the UX FactorEffectiveUI
 
The Laws of User Experience: Making it or Breaking It with the UX Factor
The Laws of User Experience: Making it or Breaking It with the UX FactorThe Laws of User Experience: Making it or Breaking It with the UX Factor
The Laws of User Experience: Making it or Breaking It with the UX FactorEffective
 
EScreenz white paper
EScreenz white paperEScreenz white paper
EScreenz white paperEScreenz
 
Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerDenim Group
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonDevSecCon
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSebastien Deleersnyder
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish PresentationWon Ju Jub
 

Ähnlich wie Employee security awareness communication (20)

May2010 cq53-worldwide-tour
May2010 cq53-worldwide-tourMay2010 cq53-worldwide-tour
May2010 cq53-worldwide-tour
 
Make Better Decisions!
Make Better Decisions!Make Better Decisions!
Make Better Decisions!
 
It's 2012 and My Network Got Hacked - Omar Santos
It's 2012 and My Network Got Hacked  - Omar SantosIt's 2012 and My Network Got Hacked  - Omar Santos
It's 2012 and My Network Got Hacked - Omar Santos
 
Kony-Forrester Webinar: The Evolution of Mobile First Development
Kony-Forrester Webinar: The Evolution of Mobile First DevelopmentKony-Forrester Webinar: The Evolution of Mobile First Development
Kony-Forrester Webinar: The Evolution of Mobile First Development
 
Social setup guide
Social setup guideSocial setup guide
Social setup guide
 
Discovery delivery 中国软件技术大会2011
Discovery delivery 中国软件技术大会2011Discovery delivery 中国软件技术大会2011
Discovery delivery 中国软件技术大会2011
 
Insider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM EditionInsider's guide to Innovate 2012 CCM Edition
Insider's guide to Innovate 2012 CCM Edition
 
The Evolution and Future of Business Video
The Evolution and Future of Business VideoThe Evolution and Future of Business Video
The Evolution and Future of Business Video
 
Lean Strategies for IT Support Organizations
Lean Strategies for IT Support OrganizationsLean Strategies for IT Support Organizations
Lean Strategies for IT Support Organizations
 
Dragonsden 2012
Dragonsden 2012Dragonsden 2012
Dragonsden 2012
 
Unlocking High Impact Go To Market - V3 Exposed
Unlocking High Impact Go To Market - V3 ExposedUnlocking High Impact Go To Market - V3 Exposed
Unlocking High Impact Go To Market - V3 Exposed
 
The Laws of User Experience: Making it or breaking it with the UX Factor
The Laws of User Experience: Making it or breaking it with the UX FactorThe Laws of User Experience: Making it or breaking it with the UX Factor
The Laws of User Experience: Making it or breaking it with the UX Factor
 
The Laws of User Experience: Making it or Breaking It with the UX Factor
The Laws of User Experience: Making it or Breaking It with the UX FactorThe Laws of User Experience: Making it or Breaking It with the UX Factor
The Laws of User Experience: Making it or Breaking It with the UX Factor
 
EScreenz white paper
EScreenz white paperEScreenz white paper
EScreenz white paper
 
Application Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability ManagerApplication Security Program Management with Vulnerability Manager
Application Security Program Management with Vulnerability Manager
 
Elizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unisonElizabeth Lawler - Devops, security, and compliance working in unison
Elizabeth Lawler - Devops, security, and compliance working in unison
 
Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
Soffront Employee helpdesk
Soffront Employee helpdeskSoffront Employee helpdesk
Soffront Employee helpdesk
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
C S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  PresentationC S S L P &  OWASP 2010 & Web Goat By  Surachai.C  Publish  Presentation
C S S L P & OWASP 2010 & Web Goat By Surachai.C Publish Presentation
 

Mehr von SnapComms

5 Point Internal Communications Plan
5 Point Internal Communications Plan5 Point Internal Communications Plan
5 Point Internal Communications PlanSnapComms
 
Internal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and visionInternal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and visionSnapComms
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Hospital Internal Communication with SnapComms
Hospital Internal Communication with SnapCommsHospital Internal Communication with SnapComms
Hospital Internal Communication with SnapCommsSnapComms
 
Internal sales manager communication with SnapComms
Internal sales manager communication with SnapCommsInternal sales manager communication with SnapComms
Internal sales manager communication with SnapCommsSnapComms
 
Internal product manager communication with SnapComms
Internal product manager communication with SnapCommsInternal product manager communication with SnapComms
Internal product manager communication with SnapCommsSnapComms
 
Internal communications with SnapComms
Internal communications with SnapCommsInternal communications with SnapComms
Internal communications with SnapCommsSnapComms
 
Internal communication for hospitals with SnapComms
Internal communication for hospitals with SnapCommsInternal communication for hospitals with SnapComms
Internal communication for hospitals with SnapCommsSnapComms
 
Internal helpdesk communication with SnapComms
Internal helpdesk communication with SnapCommsInternal helpdesk communication with SnapComms
Internal helpdesk communication with SnapCommsSnapComms
 
Internal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsInternal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsSnapComms
 
Get Employee Attention
Get Employee AttentionGet Employee Attention
Get Employee AttentionSnapComms
 
A Cat's Guide to Internal Comms
A Cat's Guide to Internal CommsA Cat's Guide to Internal Comms
A Cat's Guide to Internal CommsSnapComms
 
SnapComms Quick Intro
SnapComms Quick IntroSnapComms Quick Intro
SnapComms Quick IntroSnapComms
 
Contact Centre Communications Ideas
Contact Centre Communications IdeasContact Centre Communications Ideas
Contact Centre Communications IdeasSnapComms
 
Your Security Awareness Program
Your Security Awareness ProgramYour Security Awareness Program
Your Security Awareness ProgramSnapComms
 
Mobile in Enterprise Communication
Mobile in Enterprise CommunicationMobile in Enterprise Communication
Mobile in Enterprise CommunicationSnapComms
 
Ideas to Motivate Sales Teams
Ideas to Motivate Sales TeamsIdeas to Motivate Sales Teams
Ideas to Motivate Sales TeamsSnapComms
 
Hand Hygiene Program Ideas
Hand Hygiene Program IdeasHand Hygiene Program Ideas
Hand Hygiene Program IdeasSnapComms
 
Overview of SnapComms Internal Communication Software
Overview of SnapComms Internal Communication SoftwareOverview of SnapComms Internal Communication Software
Overview of SnapComms Internal Communication SoftwareSnapComms
 

Mehr von SnapComms (20)

5 Point Internal Communications Plan
5 Point Internal Communications Plan5 Point Internal Communications Plan
5 Point Internal Communications Plan
 
Internal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and visionInternal Marketing - Tips to align staff to your brand values and vision
Internal Marketing - Tips to align staff to your brand values and vision
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Hospital Internal Communication with SnapComms
Hospital Internal Communication with SnapCommsHospital Internal Communication with SnapComms
Hospital Internal Communication with SnapComms
 
Internal sales manager communication with SnapComms
Internal sales manager communication with SnapCommsInternal sales manager communication with SnapComms
Internal sales manager communication with SnapComms
 
Internal product manager communication with SnapComms
Internal product manager communication with SnapCommsInternal product manager communication with SnapComms
Internal product manager communication with SnapComms
 
Internal communications with SnapComms
Internal communications with SnapCommsInternal communications with SnapComms
Internal communications with SnapComms
 
Internal communication for hospitals with SnapComms
Internal communication for hospitals with SnapCommsInternal communication for hospitals with SnapComms
Internal communication for hospitals with SnapComms
 
Internal helpdesk communication with SnapComms
Internal helpdesk communication with SnapCommsInternal helpdesk communication with SnapComms
Internal helpdesk communication with SnapComms
 
Internal health and safety communication with SnapComms
Internal health and safety communication with SnapCommsInternal health and safety communication with SnapComms
Internal health and safety communication with SnapComms
 
Get Employee Attention
Get Employee AttentionGet Employee Attention
Get Employee Attention
 
A Cat's Guide to Internal Comms
A Cat's Guide to Internal CommsA Cat's Guide to Internal Comms
A Cat's Guide to Internal Comms
 
SnapComms Quick Intro
SnapComms Quick IntroSnapComms Quick Intro
SnapComms Quick Intro
 
Contact Centre Communications Ideas
Contact Centre Communications IdeasContact Centre Communications Ideas
Contact Centre Communications Ideas
 
Your Security Awareness Program
Your Security Awareness ProgramYour Security Awareness Program
Your Security Awareness Program
 
Mobile in Enterprise Communication
Mobile in Enterprise CommunicationMobile in Enterprise Communication
Mobile in Enterprise Communication
 
Ideas to Motivate Sales Teams
Ideas to Motivate Sales TeamsIdeas to Motivate Sales Teams
Ideas to Motivate Sales Teams
 
Hand Hygiene Program Ideas
Hand Hygiene Program IdeasHand Hygiene Program Ideas
Hand Hygiene Program Ideas
 
Overview of SnapComms Internal Communication Software
Overview of SnapComms Internal Communication SoftwareOverview of SnapComms Internal Communication Software
Overview of SnapComms Internal Communication Software
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Employee security awareness communication

  • 2. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats INFO FOR YOU….INFO FOR Y Easy to install. Easy and quick to use. Measure delivery, click-throughs, responses.
  • 3. Visual Message Types and Suggested Security Awareness Uses Screensavers Tickers Alerts Interactive Surveys Magazine 4. Critical Screensavers Ticker Bar Pop-up Alert Notifications to Forums Staff Poll Magazine IS teams, critical breach notices to users. Drive up Desktop Wallpaper RSS Feeds Pop-up RSVP Blogs Training Staff Quiz participation and customize 1. 3. 2. through RSVP. Reinforce Drive fast Measure Showcase knowledge, action when understanding, Pop-up Video dynamic video Helpdesk learning over processes actions taken, training/SA time change or training content action required effectiveness. through Video. (compliance, cut overs, roll outs). Q&A
  • 4. Screensavers • Reinforce data security behaviors through visual reminders • Change behavior and impart knowledge over time • Easily change out content items with no network impact • Target multiple messages to appropriate audiences • Enable Links and drive people to more info online, quizzes, audits, interactive forums on security awareness
  • 5. SECURITY AWARENESS TIP # 5: Log out before you leave. Did I log out?
  • 6. How Do they work? 1. Upload your content to the Content Manager as a new screensaver message 2. Choose your Target Audience 3. Set display duration and other options 4. “Publish” out to your audience 5. Your message now cycles on their computer during screen saver mode, together with any other active screensaver targeted to them Screensavers
  • 7. LOCK YOUR LAPTOP! Keep your laptop secure by: 1. Use Unique and secure passwords 2. VPN daily (so virus protection updates run) 3. Don’t open unknown attachments Tips: Creating easy-to-remember, strong passwords (click here)
  • 8. Is your password your pet’s name? CHANGE IT NOW! Check out the 10 things you should do to keep information secure (click anywhere)
  • 9. Is your password your pet’s name? CHANGE IT NOW! Check out the 10 things you should do to keep information secure (click anywhere)
  • 10. SECURITY AWARENESS TIP – APRIL 2012 Which kind of security breaches present the biggest risk? a. Malware infection b. Lost or stolen laptop c. Account compromise d. Weak passwords e. None of the above Test your knowledge! Click here to take our short quiz
  • 11. Desktop wallpaper • Cycle multiple messages during the day as wallpaper • Reinforce key behaviors over time • Target different visuals to retail, corporate, customer-facing vs internal devices
  • 12.
  • 13.
  • 14. Pop-up Quizzes and Surveys • Survey to understand current behaviors • Quiz to reinforce best practice and measure understanding • Visual delivery and auto-reminders ensure high response rates • Send to smaller employee sample groups more often and still get statistically relevant data
  • 15.
  • 16.
  • 17.
  • 18. Ticker/RSS Scroll • Ensure audiences seek critical messages in time • Target messages to everyone or just to specific employee groups involved • Drive fast action when processes change or action required (compliance, cut overs, roll outs)
  • 19.
  • 20.
  • 21.
  • 22. Link a Ticker Headline to a URL – when your audience clicks on the headline, it will launch the page and take them to the information you need them to see or act upon.
  • 23. Pop-Up Alert Notifications • Ensure audiences seek critical messages in time • Target messages to everyone or just to specific employee groups involved • Drive fast action when processes change or action required • Showcase video tips, messages, content • Increase Event/Training registrations
  • 24. Send a dynamic pop-up alert and have it automatically return later, if not actioned.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. Visual Message Types and Suggested Security Awareness Uses Screensavers Tickers Alerts Interactive Surveys Magazine 4. Critical Screensavers Ticker Bar Pop-up Alert Notifications to Forums Staff Poll Magazine IS teams, critical breach notices to users. Drive up Desktop Wallpaper RSS Feeds Pop-up RSVP Blogs Training Staff Quiz participation and customize 1. 3. 2. through RSVP. Reinforce Drive fast Measure Showcase knowledge, action when understanding, Pop-up Video dynamic video Helpdesk learning over processes actions taken, training/SA time change or training content action required effectiveness. through Video. (compliance, cut overs, roll outs). Q&A

Hinweis der Redaktion

  1. The RSVP pop-up Alert variation will drive event registrations and can include other questions (accommodation, meal preferences, questions for speaker). Generates a calendar appointment at the end for the user.