Skip to main content
FoxPointe FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog
  • Contact Us
FoxPointe
  • Services
    • Cyber Risk, Assurance and Compliance
    • IT Audit
    • Penetration Testing
    • General Consulting
    • Virtual Chief Information Security Officer (vCISO)
  • About Us
    • Management Team
    • Credentials
    • Careers
  • Resources
    • Events
    • News
    • Videos
    • Whitepapers
  • Blog

Enter Keywords

  1. Home
  2. Blog

FoxPointe Security Hub

Best Practices for Employee Screening, Training and Testing to build a Cyber Resilient Workforce

January 30, 2023

Building a cyber resilient workforce for is critical to a cyber security program for all companies. According to Verizon’s 2022 Data Breach Investigations Report “This year (2022) 82% of breaches involved the human element. Whether it is the Use of stolen credentials, Phishing, Misuse, or simply an Error, people continue to play a very large role in incidents and breaches alike.”

 

We will be discussing the business best practice for the following three areas within this report to help create a cyber resilient workforce:

  1. Candidate Screening Practices
  2. Cyber Training
  3. Testing of the Workforce

 

When screening candidates, it is important to identify the types of information and systems they will have access to based upon their job role as well as the impact on security they can have if they were an insider threat to the company. Criminal background and employment history checks can be used to identify past behavior of fraud. Additionally, determining if the candidate was honest about the disclosure of criminal history can be an indicator if they are trustworthy or not. Credit screening (where allowed by law) is also another pre-employment check that can identify motives for financial fraud within a company.

 

Security awareness training has been around for a long time. Traditionally, training is given to staff upon hire and annually thereafter. And while that does satisfy most legal and regulatory requirements, the industry has shown that more frequent training benefits the workforce more than once a year training. Additionally, not all training is created equally, it is important to take a look at the training offered and determine if there are interactive content that engaging and helpful to the end user or not.

 

Email spam filters and other technologies have been developed to assist organizations in dealing with phishing attempts of their employees, but no technology will be able to block 100% of phishing email. That is why it is so important to test the workforce to identify weak areas and use that as an education opportunity to help strengthen your information security. It is important that those that fail the phishing tests are subjected to additional training to help them better identify phishing emails in the future. Additionally, those who identify the email as phishing but do not properly report the incident should be educated that all phishing attempts need to be alerted so that the email can be scrubbed system wide and while they did not fall for the attempt, others might within the organization.

 

Cybersecurity  
Share
Twitter Facebook LinkedIn
  • Topics
  • Authors
  • Data Security (13)
  • Data Privacy (15)
  • Compliance (4)
  • Risk Management (8)
  • Cybersecurity Alert (7)
  • Cybersecurity (25)
  • Archive (34)
  • Charlie Wood | PCI QSA, CISA, CRISC, CISM
  • Carl Cadregari | CISA, CCSFP, CTPRP
  • Allison Hall | PCIP, CCSFP
  • Courtney Caryl | CCSFP, CHQP
Let us show you how we can help
Request Quote
FoxPointe

171 Sully's Trail
Pittsford, NY 14534

Call 844-726-8869
or Contact Us

Subscribe to the Blog

Services
Cyber Risk, Assurance and ComplianceIT AuditPenetration TestingGeneral ConsultingVirtual Chief Information Security Officer (vCISO)
Company
Management TeamAbout UsBlogCareersPrivacy Policy
©2023 FoxPointe
Website by Corporate Communications, Inc.
We use cookies and other technologies to optimize site functionally, analyze website traffic, and share information with our service and analytics partners. To view our Privacy Policy, which discusses cookies, click here. By continuing to use & browse our services, you agree to our Privacy Policy, our use of cookies, and the Terms and Conditions.