Trusted Learning Helps Enterprise Meet Regulatory Requirements

Share Article

CSI/FBI and other statistics show employees are still the weakest link in any security plan. No matter how good your information security architecture, the authorized employees cannot be counted on to remember that links are bad and file-sharing over Instant Message is even worse.

With hundreds of thousands of Web-based vulnerabilities in Web-based systems, the situation is out of their control.

CSI/FBI and other statistics show employees are still the weakest link in any security plan. No matter how good your information security architecture, the authorized employees cannot be counted on to remember that links are bad and file-sharing over Instant Message is even worse.

Thus, through permissive use of their browsers, users are letting in all kinds of malware now being detected on what some statistics show are half of all computers worldwide. Remote-controlled botnets, some consisting of millions of computers that are doing the bidding of an evil master, are being found regularly on the Internet. Tens of thousands of Web sites are also infected, spreading botware that turns computers into Spam and identity theft zombies the moment they go to the infected Web site. Thus, they need constant training and reminders.

“When writing a story about Websites spreading remote control-ware in June ‘06, one of my sources, the Chief Security Officer of GoDaddy.com, told me that the Internet’s not for the faint of heart,” says Radcliff, an award-winning security writer, author and speaker.

“With hundreds of thousands of Web-based vulnerabilities in Web-based systems, the situation is out of their control.”

Trusted Learning Corporation http://www.TrustedLearning.Com and The Security Awareness Company are now offering Radcliff’s exceptional on-line awareness and training courses. Winn Schwartau, Founder and CEO of both companies says, “Deb’s got a real way with training the end users in Corporations. Her courses are getting more popular every day.”

“The first thing enterprise leaders need to know is that users are not stupid,” says Radcliff. “It’s that the technology’s just so darn confusing. We’ve given millions of non-technical users the tools to go online without the security basics. And even if they practice automatic updates and keep current their security software, they’re still getting clobbered when they go to Web sites that’ve been turned into keystroke logger installers and spambot relays.”

What they need is good, repeatable and updatable education, which Radcliff delivers with her security awareness courses for end users at the Security Awareness School. http://www.trustedlearning.com

A distinguished online crime and security writer since 1995, Radcliff calls herself ‘a writer who’s learned the language of geek.’ As such, she can translate the technical in terms that your user audience can understand.

These 30-minute online courses come in four basic categories (Beware the conman, safe usage, security of computers, identity protection) and can be customized to your organization’s needs.

The testing feature at the end each course will certify that the student passed or didn’t pass the course, records that could be used to identify areas of need, and as support materials for security audits.

“At least,” says Radcliff, “You can show auditors that you’ve done your diligence in training and education in support of your security policies and technical measures.”

http://www.deb.radcliff.com

Contact:

Ava Styles

Trusted Learning/The Security Awareness Company

727.393.6600

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Ava Styles
Visit website