Phishing remains the most likely threat that organisations will face on a day-to-day basis. Designing an effective awareness training program in your Phriendly Phishing platform requires planning and a strategic understanding of your learners’ needs. This article will guide administrators how to decide which courses to schedule, using a structured approach grounded in Phriendly Phishing’s learning methodology, helping to remediate this risk through awareness training.
Step 1: Start with the Fundamentals
Initiating your training program should begin with foundational knowledge. Phriendly Phishing recommends starting with "S.C.A.M 1: Fundamentals." This course is designed to introduce learners to the basics of the S.C.A.M. framework (Sender, Content, Action, Manage), which encapsulates the core aspects of phishing threats. By understanding these fundamentals, learners can recognize the common tactics scammers employ, making it an essential first step in your cybersecurity training agenda. This can be followed up with S.C.A.M 2 (Identification) and S.C.A.M 3 (Application).
Step 2: Assess Your Organisational Needs
Each organization has unique needs and risks, making it crucial to tailor your cybersecurity training accordingly. Consider the following factors when deciding on subsequent courses:
- Cyber Literacy and Awareness Levels: Gauge the current level of cyber literacy within your organisation. Are your employees beginners, or do they already possess some cyber security knowledge? Running your baseline campaign will help you understand what your current level of risk is.
- Recent Incidents: Have there been any cyber security incidents within your organisation or industry recently? Role based, Industry based, and government guideline courses should address any identified vulnerabilities these incidents may have revealed.
- Regulatory Obligations: Ensure that your course selection complies with any industry-specific regulations that apply to your organisation, and ensure it compliments any other internal training you may be required to complete.
- Learning Environment: Consider the environments in which your learners operate. Are they mostly remote, or do they travel frequently? Tailor the training to address the specific risks associated with these environments.
Step 3: Diversify Your Training Program
Engagement is key to effective learning. To maintain interest and enhance retention, mix up the courses you offer. Integrate topics beyond phishing, such as general security practices, data privacy, and protecting digital identities. By varying the courses, you not only keep the training fresh and engaging but also provide comprehensive knowledge that empowers your learners to safeguard themselves in multiple aspects of their lives.
Step 4: Highlight Personal Relevance
To further engage your learners, highlight the personal relevance and benefits of cyber security awareness. Show how these skills can protect not just the organisation but their personal information as well, such as through courses on smishing or digital identity protection. When learners see the value in the training for their personal use, their motivation to engage and learn increases. Sharing the information they have learned with friends and family can strengthen our community.
Step 5: Continuous Consultation and Feedback
Finally, keep the lines of communication open with your Customer Success Manager and your learners. Regular consultation and feedback are crucial in understanding the effectiveness of your training program and identifying areas for improvement. Adjust your course schedule based on this feedback to continually enhance the learning experience.
Deciding what courses to schedule in your cybersecurity training program shouldn’t be an overwhelming task. By starting with fundamental courses like S.C.A.M 1 and considering your unique organisational needs and learner engagement, you can develop a robust training program that not only addresses the principal threats but also fosters a culture of cyber security awareness.
Example 12 Month Training Plan
How to preview courses from the course catalogue here.
Comments
0 comments
Please sign in to leave a comment.