|
This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on physical computer...
|
|
|
This gamification guide will help you create a gamification strategy for security awareness and training by running through six simple steps.
|
|
|
This training program manual will allow you to document key information and provides an overview of your new training program.
|
|
|
The administrative rights policy grants access to individuals’ desktop, laptop, or other end-user devices within a company for those who are qualified and cleared to use...
|
|
|
The instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging.
|
|
|
The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...
|
|
|
The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...
|
|
|
This document contains numerous mock spear phishing email examples that can be used to test end users’ susceptibility to such attacks.
|
|
|
Formalize your security awareness and training program into a policy to ensure that your employees are held accountable.
|
|
|
Use this tool to determine your organization’s security training and awareness needs to begin building your training and awareness program.
|
|