{"id":3751,"date":"2013-10-08T00:00:00","date_gmt":"2013-10-08T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2013\/10\/08\/how-to-offer-security-awareness-training-that-works\/"},"modified":"2021-01-28T16:19:36","modified_gmt":"2021-01-28T16:19:36","slug":"how-to-offer-security-awareness-training-that-works","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/","title":{"rendered":"How to Offer Security Awareness Training That Works"},"content":{"rendered":"<div id=\"article-content\">\n<p>There is a reason phishing scams remain popular. Despite the fact most knowledge workers know the risks of clicking on unknown attachments or links, a significant number of them continue to do it. A recent Harris Interactive survey found that 19 percent of U.S. employees working in an office said they <a href=\"https:\/\/www.esecurityplanet.com\/networks\/-security\/19-percent-of-office-workers-have-opened-a-suspicious-e-mail.html\">had opened an email at work that they suspected could be a scam<\/a> \u2013 and those were just the ones willing to admit it. Chances are, the actual number is higher.<\/p>\n<p>Despite this, many security professionals focus on technology and treat user training as an afterthought.<\/p>\n<p>&#8220;Most people buy first and train later, but that&#8217;s the wrong approach,&#8221; said Bill Gardner, an assistant professor who teaches Digital Forensics and Information Assurance at Marshall University and president and principal security consultant of Blackrock Consulting. &#8220;A <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">next generation firewall<\/a> is not going to protect you if a bad guy can get somebody inside to do something for them.&#8221;<\/p>\n<p><strong><em>See our picks for <a href=\"https:\/\/www.esecurityplanet.com\/products\/cybersecurity-training\/\">top employee security awareness training programs<\/a><\/em><\/strong><\/p>\n<p>Gardner and Valerie Thomas, a senior security consultant for<a href=\"http:\/\/securicon.com\/\"> Securicon<\/a>, walked attendees at the recent Derbycon conference through how to create an effective information security awareness program. Not surprisingly, much of their advice focused on making security training pervasive and highly accessible to users.<\/p>\n<p>Here are some tips from their presentation:<\/p>\n<p><strong>Get management buy-in.<\/strong> With management, stress the dollars and cents of good security. Emphasize the productivity gains attained by reducing security-related downtime as well as the financial losses that can result from data breaches. As a member of the Derbycon audience pointed out, &#8220;You can add at least three zeroes to any financial settlement resulting from a data breach if you can\u2019t show that you had a training program.&#8221;<\/p>\n<p><strong>Target your security training<\/strong>. Should you offer the same training to the sales people as you do to mailroom workers? No, said Gardner, noting that training should focus on the specific vulnerabilities faced by different users. Sales people, for example, should get more information on mobile security as they are more likely than other employees to use mobile devices and apps for their jobs. And don&#8217;t forget to train the IT department, he said.<\/p>\n<p><strong>Make it pervasive<\/strong>. Security awareness training shouldn\u2019t be a &#8220;once and it&#8217;s done&#8221; exercise. Training should be offered annually, at a minimum, and preferably every quarter. The best approach is to make training continual, Gardner said. So, for example, set up users&#8217; desktops so they see a different security message every week. &#8220;You want to build a culture around awareness,&#8221; he said.<\/p>\n<p><strong>Presentation is everything.<\/strong> Thomas described an experience in which the management of a client company was flabbergasted at the standing-room-only crowd Thomas attracted to a security awareness presentation. It wasn&#8217;t magic, she said. Instead of sending out the usual notice asking employees to attend a mandatory\u00a0 training session, she invited them to a presentation titled &#8220;How Hackers Steal Your Personal Information.&#8221; While she discussed the same security principles always presented during training, she packaged them so they were more interesting and relevant to users. &#8220;Marketing people are great at packaging information. Talk to them for tips,&#8221; she suggested.<\/p>\n<p><strong>Explain why security policies are needed<\/strong>. Even with stories of high-profile data breaches landing in the headlines of mainstream media publications, users may not feel their own data is at risk. You need to illustrate, preferably through examples targeted to the audience, how hackers can use their data and what it could end up costing the company.<\/p>\n<p><strong>Show users specific examples of security no-nos<\/strong>. Instead of just telling users not to click on suspicious attachments or links, show them what &#8220;suspicious&#8221; looks like. Show slides and &#8220;highlight the bad stuff,&#8221; Thomas said. A video is even better than slides. Again, target these presentations to your users.\u00a0 Gardner has highlighted the dangers of data leakage through metadata for audiences of attorneys, for example, cautioning them to be careful when redlining or tracking changes on documents that could go to opposing counsel.<\/p>\n<p><strong>Make it easy for users to comply with security policies<\/strong>. Thomas advocated the use of password safes, software that automatically generates and stores encrypted passwords. That way, she said, &#8220;Users don&#8217;t need to keep thinking of good passwords or even think about passwords at all.&#8221; Gardner, on the other hand, does not like password safes. Instead, he advised working with users by &#8220;not coming up with policies so complex they can&#8217;t remember their passwords&#8221; and offering a self-service option so they can re-set their own passwords if they do forget them. He even tells users it&#8217;s OK to write down a password \u2013 as long as they keep it in their wallets.<\/p>\n<p><strong>Maintain the right attitude<\/strong>. &#8220;You are further educating educated people&#8221; who unlike you are not experts in security, Gardner said. &#8220;Don\u2019t call them stupid.&#8221;<\/p>\n<p><strong>Use the right metrics to gauge effectiveness of training<\/strong>. Track help desk tickets for an idea of how well training is working, suggested Gardner. You can expect to see an increase in users reporting concerns about suspicious links, for example. Thomas sends emails with suspicious links to test users&#8217; resistance to social engineering scams, both before and after covering the topic in training. The number of users clicking on such links should decline following training. Even better, you may see an increase in users reporting their concerns to security personnel.<\/p>\n<p><em>Ann All is the editor of eSecurity Planet and Enterprise Apps Today. She has covered business and technology for more than a decade, writing about everything from business intelligence to virtualization.<\/em><\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d706c189289-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d706c189289\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d706c189289\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d706c189289\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d706c189289\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d706c189289\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d706c189289\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>There is a reason phishing scams remain popular. Despite the fact most knowledge workers know the risks of clicking on unknown attachments or links, a significant number of them continue to do it. A recent Harris Interactive survey found that 19 percent of U.S. employees working in an office said they had opened an email [&hellip;]<\/p>\n","protected":false},"author":174,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[841,2736],"b2b_audience":[35],"b2b_industry":[],"b2b_product":[377,375],"class_list":["post-3751","post","type-post","status-publish","format-standard","hentry","category-networks","tag-data-security","tag-phishing","b2b_audience-implementation-and-support","b2b_product-gateway-and-network-security","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Offer Security Awareness Training That Works<\/title>\n<meta name=\"description\" content=\"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Offer Security Awareness Training That Works\" \/>\n<meta property=\"og:description\" content=\"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-08T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:19:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ann All\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ann All\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\"},\"author\":{\"name\":\"Ann All\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2fd1193296060bbad7e9557989734507\"},\"headline\":\"How to Offer Security Awareness Training That Works\",\"datePublished\":\"2013-10-08T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:19:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\"},\"wordCount\":934,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"data security\",\"phishing\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\",\"name\":\"How to Offer Security Awareness Training That Works\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2013-10-08T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:19:36+00:00\",\"description\":\"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Offer Security Awareness Training That Works\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2fd1193296060bbad7e9557989734507\",\"name\":\"Ann All\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/1516995126385-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/1516995126385-150x150.jpeg\",\"caption\":\"Ann All\"},\"description\":\"Ann All is an eSecurity Planet contributor\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/ann-all\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Offer Security Awareness Training That Works","description":"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/","og_locale":"en_US","og_type":"article","og_title":"How to Offer Security Awareness Training That Works","og_description":"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/","og_site_name":"eSecurity Planet","article_published_time":"2013-10-08T00:00:00+00:00","article_modified_time":"2021-01-28T16:19:36+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Ann All","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Ann All","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/"},"author":{"name":"Ann All","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2fd1193296060bbad7e9557989734507"},"headline":"How to Offer Security Awareness Training That Works","datePublished":"2013-10-08T00:00:00+00:00","dateModified":"2021-01-28T16:19:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/"},"wordCount":934,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["data security","phishing"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/","name":"How to Offer Security Awareness Training That Works","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2013-10-08T00:00:00+00:00","dateModified":"2021-01-28T16:19:36+00:00","description":"Want employees to pay attention to security awareness training? Make it accessible, pervasive and targeted to your audience.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-to-offer-security-awareness-training-that-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Offer Security Awareness Training That Works"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/2fd1193296060bbad7e9557989734507","name":"Ann All","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/1516995126385-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/1516995126385-150x150.jpeg","caption":"Ann All"},"description":"Ann All is an eSecurity Planet contributor","url":"https:\/\/www.esecurityplanet.com\/author\/ann-all\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/3751"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/174"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=3751"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/3751\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=3751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=3751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=3751"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=3751"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=3751"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=3751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}