Close Menu
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact

Subscribe to Updates

Get the latest technology news from TechFinancials News about FinTech, Tech, Business, Telecoms and Connected Life.

What's Hot

Parliament Wants Minister Malatsi To Explain ‘Bending BEE Laws’ For Elon Musk’s Starlink

2025-05-24

SITA Backs SIU Probe Into 2017 Procurement, Vows Transparency

2025-05-23

How IoT Innovator IoT.nxt Continues To Power Vodacom Beyond Mobile Strategy

2025-05-23
Facebook X (Twitter) Instagram
Trending
  • Parliament Wants Minister Malatsi To Explain ‘Bending BEE Laws’ For Elon Musk’s Starlink
Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp RSS
TechFinancials
  • Homepage
  • News
  • Cloud & AI
  • ECommerce
  • Entertainment
  • Finance
  • Opinion
  • Podcast
  • Contact
TechFinancials
Home»Latest News»Cybersecurity Training For Business: What Works, What Doesn’t, And Why
Latest News

Cybersecurity Training For Business: What Works, What Doesn’t, And Why

Staff WriterBy Staff Writer2023-07-27No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Cybersecurity
Cybersecurity Photo by cottonbro studio: https://www.pexels.com/photo/laptop-in-close-up-shot-5483248/
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Despite technological advances in cybersecurity, humans remain the weakest link in companies’ security strategies – and social media isn’t helping.

Says Tony Walt, co-founder and director at Port443, “Staff training is essential for cultivating cybersecurity awareness. Employees must understand that posting even ‘non-sensitive’ personal information can lead to identity theft. It also potentially exposes their work passwords and puts their employers at risk.”

For instance, birthday wishes on your social media profiles can help threat actors work out the first six digits of your South African ID number. Your social media profile also gives criminals clues about the seventh to tenth digits of your ID number (females 0000-4999 and males 5000-9999). The 11th digit of your ID number (0 or 1) can be deduced based on whether you’re a South African citizen or a permanent resident.

“If you work for a bank, you likely have an account with that bank too, which provides another way for a threat actor to gather information about you. All this information that is in the public sphere lets malicious actors establish trust when they communicate with you – and your staff. It leads victims to lower their guard and inadvertently reveal more sensitive data,” Walt states.

He shares the following guidelines on what works and doesn’t in cybersecurity training:

What works

  • Ongoing, targeted training is essential. This approach addresses a specific individual’s risky behaviours, such as clicking on suspicious links.

“Companies should make ongoing, specific, targeted training part of their organisational processes,” Walt advises.

  • Regularly simulate phishing to help employees recognise and avoid deceptive emails or phone calls.

Like fire drills, simulations let employees and employers identify areas that need further training. The organisation develops a stronger defence against cyberattacks as a result, according to Walt.

  • Gamify and role-play your training. These two tactics enhance employee engagement, and make learning fun and memorable.

Says Walt, “More importantly, role-playing helps staff to practise appropriate responses in a controlled environment.”

  • Explain why password hygiene may be a pain but is important. Help staff to understand why it’s so important to have strong, unique passwords and frequent updates. He advises, “Make it clear that although changing passwords can be annoying, it prevents unauthorised access and strengthens overall security.”
  • Encourage and celebrate incident reporting. Staff may be too scared of losing their jobs to report incidents, which leaves the company clueless about vulnerabilities. “Your staff need to know they will be supported when they report an incident. This helps to ensure prompt action, and minimises damage,” Walt says.

What doesn’t work

  • Lecture-style training, passive learning methods and lengthy presentations don’t engage employees. “Do everything in your power to make training fun. Otherwise you’re diminishing your people’s ability to retain information and apply it in practical situations,” he advises.
  • One-and-done approaches don’t work either. Cybersecurity threats evolve rapidly, so a single training session is insufficient. Ongoing education is crucial to staying ahead of emerging risks, Walt concludes.

cybersecurity
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Staff Writer

Related Posts

Opera Mini Launches #DataDance To Tackle High Data Costs in SA

2025-05-23

SIU Cracks Down On Lottery Corruption, But NPA Missing In Action

2025-05-23

Limpopo Residents Use Social Grants To Buy Water Amid Municipal Failure

2025-05-23

Huawei, Cape Peninsula University Launch ICT Academy Support Centre

2025-05-22

Continued AGOA Participation Aimed At Collective African Prosperity

2025-05-22

President Ramaphosa Rejects White Genocide Claims At Oval Office Meeting

2025-05-22

New Ad Network Aims To Put South African Publishers First

2025-05-21

EFF Threatens Legal Action Over Starlink’s BEE Exemption In SA

2025-05-20

SA Government Starts Review Of Social Grants Payment System

2025-05-20
Leave A Reply Cancel Reply

DON'T MISS
Breaking News

uConnect Selling SIMs Without ID Checks, Violating RICA – Fraud Risk

Virtual mobile provider uConnect allows customers to buy SIM cards without verifying their IDs. uConnect…

Equity Equivalent: How Amazon, IBM, Microsoft Comply With B-BBEE

2025-05-21

Are We Raising AI Correctly? 

2025-05-16

TV Licences Are Outdated, But Is A Streaming Levy The Right Fix?

2025-03-17
Stay In Touch
  • Facebook
  • Twitter
  • YouTube
  • LinkedIn
OUR PICKS

How IoT Innovator IoT.nxt Continues To Power Vodacom Beyond Mobile Strategy

2025-05-23

Canal+ To Freeze Retrenchments At MultiChoice

2025-05-23

Eskom To Research Green Hydrogen Production For Next-Gen Power Solutions

2025-05-21

Bob Box Aims To Be A Major Player In SA’s Smart Locker Market

2025-05-20

Subscribe to Updates

Get the latest tech news from TechFinancials about telecoms, fintech and connected life.

About Us

TechFinancials delivers in-depth analysis of tech, digital revolution, fintech, e-commerce, digital banking and breaking tech news.

Facebook X (Twitter) Instagram YouTube LinkedIn WhatsApp Reddit RSS
Our Picks

Parliament Wants Minister Malatsi To Explain ‘Bending BEE Laws’ For Elon Musk’s Starlink

2025-05-24

SITA Backs SIU Probe Into 2017 Procurement, Vows Transparency

2025-05-23

How IoT Innovator IoT.nxt Continues To Power Vodacom Beyond Mobile Strategy

2025-05-23
Recent Posts
  • Parliament Wants Minister Malatsi To Explain ‘Bending BEE Laws’ For Elon Musk’s Starlink
  • SITA Backs SIU Probe Into 2017 Procurement, Vows Transparency
  • How IoT Innovator IoT.nxt Continues To Power Vodacom Beyond Mobile Strategy
  • Opera Mini Launches #DataDance To Tackle High Data Costs in SA
  • ButtaNutt Secures 54% PSG Group Investment to Fuel Plant-Based Expansion
TechFinancials
RSS Facebook X (Twitter) LinkedIn YouTube WhatsApp
  • Homepage
  • Newsletter
  • Contact
  • Advertise
  • About
© 2025 TechFinancials. Designed by TFS Media.

Type above and press Enter to search. Press Esc to cancel.

Ad Blocker Enabled!
Ad Blocker Enabled!
Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.