You've requested...

Gamification for Effective Cyber Security Awareness Training

If a new window did not open, click here to view this asset.

Download this next:

Effective Security Awareness Training to Reduce Human Risk

The advent of AI has lowered the barrier for attackers, expanding the threat landscape. This E-Book offers a guide to security awareness training to mitigate human risk.

Key topics include:

  • The four pillars of training: high-quality content, personalized vs. pre-built options, risk-based and role-based training, and phishing simulations
  • Strategies for creating engaging, task-oriented content for adult learners
  • Techniques for tailoring training to roles and risk profiles
  • Best practices for implementing a program, from defining goals to measuring success

Build a security-focused culture and empower employees as the first line of defense. Read the full E-Book to learn more.

These are also closely related to: "Gamification for Effective Cyber Security Awareness Training"

  • Secure your healthcare organization against cyber threats

    The healthcare industry faces significant cyber security challenges due to sensitive patient data and the critical role of technology in patient care. This e-book examines unique concerns, including phishing, insider threats, data breaches, DDoS attacks, ransomware, and supply chain risks.

    Key topics include:

    · Defining healthcare-specific training needs
    · Analyzing statistics on attacks targeting healthcare
    · Understanding diverse threats facing organizations
    · Exploring why security awareness training is essential

    Cyber threats in healthcare are evolving, and a proactive, tailored approach is crucial. Read this e-book to empower your team and strengthen defenses.

  • Computer Weekly – 7 February 2023: Making IT security training stick

    In this week’s Computer Weekly, our latest buyer’s guide looks at IT security training, and asks whether gamification could be the secret to making it stick. We examine how the metaverse might change the way we work in real life. And we find out how job cuts across the tech sector affect employment opportunities for IT contractors in 2023. Read the issue now.

Find more content like what you just read:

  • CW EMEA - January 2023: Protecting the privacy of schoolchildren

    In this month's CW EMEA, we look at how schools in Germany have stopped using Microsoft Office 365 over lack of clarity over how data is collected, shared and used. We also delve into how former UK spy boss Richard Dearlove leaked names of MI6 secret agent recruiters in China to back an aggressive right-wing US campaign against tech company Huawei.

    Download

  • CW Europe – December 2017

    In this quarter's CW Europe, we interview Laurence Schirrecker at Eurosport about how the broadcaster is using the latest technologies to improve how cycling enthusiasts can follow races. Computer Weekly caught up with her at the final stage of the Grand Tour cycling event La Vuelta in Madrid.

    Download

  • CIO Trends #8: Benelux

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

    Download

  • CIO Trends #8: Benelux

    In this e-guide we reveal how the Netherlands are taking the lead in cybersecurity; how Brussels is gearing up to be an insurtech hub and why the Dutch decided to share details of a Russian hacking of a major organisation with the rest of the world.

    Download

  • How do you solve a problem like security training?

    In this E-Guide, we will the tricky topic of security awareness training. Firstly, we try to answer the burning question of how to get employees to pay attention to training and take it seriously. Then, we take a look at some security awareness best practices that you can use to craft training your users will actually benefit from.

    Download

  • Top 10 Benelux IT stories of 2018

    The Netherlands and Belgium might be small in terms of population and land area, but they are leading nations when it comes to the use of technology in society. There are numerous examples of the transformative nature of IT in the Netherlands and Belgium in this top 10, such as plans for autonomous ships and smart city developments.

    Download

  • Safeguard your finance sector with cybersecurity awareness

    Cyber threats pose significant risks to the finance sector, with data breaches, ransomware, and social engineering attacks causing financial and reputational damage. This e-book explains the risks, addresses objections, and provides tips to build a cyber security-focused culture. Read the full e-book to fortify your organization's defenses.

    Download

  • Computer Weekly – 10 April 2018: Technology is a lifesaver for NHS Blood and Transplant

    In this week's Computer Weekly, we talk to the CDO of the NHS's blood and transplant agency about how digital transformation is proving to be a real lifesaver. Our latest buyer's guide examines the state of public cloud. And we find out how Ireland is gaining a Brexit dividend to boost its tech sector. Read the issue now.

    Download

  • In 2017, the insider threat epidemic begins

    Cyber security resiliency depends on detecting, deterring and mitigating insider threats. This report from the Institute for Critical Infrastructure Technology assesses the risks and potential solutions.

    Download

  • Infographic: 6 file transfer best practices

    File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.

    Download

  • A Computer Weekly buyer's guide to training programmes and tools

    It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.

    Download

  • Navigating Social Media Threats: A Digital Risk Protection Playbook

    Social media threats are surging, with businesses facing a two-fold increase in attacks. This white paper explores the threat landscape, common attack types, and best practices to protect your organization. Read the full white paper to learn how to turn social media data into actionable intelligence and effectively take down threats.

    Download

  • Quantitative and qualitative ROI analysis for cloud email security

    This report analyzes the qualitative and quantitative return on investment (ROI) of using the Fortra Cloud Email Protection platform. It shows organizations can expect excellent benefits and an ROI of 114% to 200% under reasonable assumptions. Read the full white paper to learn more.

    Download

  • Insights on the evolving email security market landscape

    This Frost Radar report analyzes the evolving email security market, including growth drivers, competitive landscape, and top vendors. Discover how AI, cloud migration, and compliance trends are shaping the future of email security. Read the full report.

    Download

  • How to demystify DevOps metrics

    Standardizing DevOps metrics across an organization is key to demystifying them and driving continuous improvement. Learn how to socialize, set goals, and leverage dashboards to boost DevOps maturity. Read the blog post to discover more.

    Download

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

    Download

  • Secure Email Market Quadrant 2024 - Competitive Analysis

    The Radicati Secure Email Market Quadrant 2024 evaluates leading vendors in the secure email market, including Proofpoint, Mimecast, Symantec, Cisco, and more. Learn how these vendors protect against email threats like phishing, BEC, and malware. Read the full report for a comprehensive analysis.

    Download

  • MicroScope – July 2021: Life on the edge

    With opportunities around edge computing on the up, we ask experts to weigh in on how the channel can approach using the tech to its advantage. Also discover how to encourage employees to take cyber security lessons seriously, and how collaboration is key to growth this year

    Download

  • Uncover the power of machine learning in email security

    This white paper explains how advanced machine learning techniques can accurately detect email impersonation and social engineering threats that bypass traditional security controls. Learn how Fortra's data science approach provides comprehensive email protection. Read the full white paper.

    Download

  • CW Europe - March-May 2020: Experts examine Dutch government’s IT problems

    Technology experts discuss the challenges and potential solutions to the Netherlands government's IT problems.

    Download

  • Recent trends in new TLD abuse and social media threats

    This report analyzes recent threats using new .dev and .vip top-level domains, including domain impersonation, social media attacks, counterfeit sites, and dark web fraud. Security leaders can use this data to understand these evolving threats and take proactive measures. Read the full report to learn more.

    Download

  • CW Nordics May 2017

    The cloud is so pervasive within enterprises today that it is easy to understate the way it has changed businesses. The internet of things is putting your security at risk. How did application performance monitoring prevent a business disaster? Read on to explore all this and much more.

    Download

  • From training to performance: Accelerating IT job readiness through practical experience.

    40% of 1,000 IT employees surveyed by Skillable reported that their training hasn't translated to on-the-job performance. This white paper explores common issues with corporate training programs and how to modernize your training playbook. Continue on to learn about 5 high-performing tactics.

    Download

  • Can AI take education to a new level?

    In this week's Computer Weekly, we examine how LLMs are being used to teach, support and assess students, enhancing education rather than impairing it. We look at how AI is impacting the semiconductor sector as big tech companies put off server upgrades. And we find out how GenAI is changing the way enterprise software works. Read the issue now.

    Download

  • Computer Weekly - 22 February 2022: Think nation-state cyber attacks won't hit you? Think again...

    In this week's Computer Weekly, with Russian state cyber attacks in the news, we find out why security professionals in every organisation need to remain alert. Our buyer's guide looks at the tools and programmes helping improve IT training. And we look at how the traditional sport of golf is undergoing a digital transformation. Read the issue now.

    Download

  • Enhancing Microsoft Security with Layered Email Protection

    Enhance email security with Fortra's integrated cloud solution. Learn how to protect against advanced threats like phishing and data loss, while complementing your existing Microsoft 365 platform. Read the full white paper to discover Fortra's comprehensive email security approach.

    Download

  • Computer Weekly - 22 June 2021: A new three-year plan for digital government

    In this week's Computer Weekly, the new CEO of the Gov-ernment Digital Service, Tom Read, explains his three-year strategy for improving online public services. EU attempts to regulate AI are under fire – we examine the issues. And we find out how Bupa is turning to the cloud to deliver per-sonalised healthcare. Read the issue now.

    Download

  • IT/OT convergence is necessary, but not so simple

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

    Download

  • A Computer Weekly Buyer's Guide to Enterprise social networking

    Companies are discovering the many advantages of communicating through social networking platforms. In this 14-page buyer's guide, Computer Weekly looks at how they can revolutionise collaboration, the options available for retailers and the pitfalls of communication overload

    Download

  • Focus: Diversity

    This e-guide focuses on diversity in the workplace and how it can help contribute to better business outcomes.

    Download

  • Getting sales reps to embrace analytics tools

    This e-guide, written by Scott Robinson (Director of BI at Lucina Health), explains why sales teams can be resistant to analytics tools, and how they can enhance the results of sales reps and managers.

    Download

  • Defend against these top threats to your security

    Along with highlighting trends and major risks in cybersecurity in 2023, this report maps out 5 best practices for security success. #1: Reduce your attack surface by segmenting your network and removing any SaaS applications that are no longer necessary for your organization. Continue on to uncover the rest.

    Download

  • Top brand impersonation attacks and defense tactics for 2024

    Experts reveal top brand impersonation attacks and defense tactics for 2024, including cryptocurrency scams, deep fakes, hybrid campaigns, and dark web exploits. Learn how to protect your organization by reading this comprehensive white paper.

    Download

  • Defend against look-alike domain threats with this playbook

    This playbook breaks down the domain lifecycle, how look-alike domains are used to enable cyberthreats, and best practices for collecting, curating, and mitigating domain threats. Read the full guide to learn how to defend your organization against look-alike domain attacks.

    Download

  • Protecting your organization from domain impersonation threats

    Domain impersonation is a growing threat for organizations, with cybercriminals using look-alike domains and email spoofing to steal data and damage reputations. Learn how to effectively monitor, detect, and mitigate domain impersonation risks in this White Paper.

    Download

  • Computer Weekly – 7 February 2017: Computer power pushes the boundaries

    In this week's Computer Weekly, we examine the ways chip engineers are looking beyond silicon to keep pushing the limits of Moore's Law. We find out about serverless computing and how it could deliver what many firms want from the cloud. And we look at the importance of culture change to digital transformation. Read the issue now.

    Download

  • Strategies to Mitigate Counterfeit Threats Targeting Businesses

    Counterfeit campaigns are on the rise, causing $5 trillion in annual losses globally. Learn how to identify and mitigate counterfeit threats targeting your business, including fraudulent ads, fake social media accounts, and look-alike domains. Read the White Paper to protect your brand and reputation.

    Download

  • Global ransomware attack is a security wake-up call

    In this week's Computer Weekly, we look at the global WannaCry ransomware attack that spread over 150 countries – will it be the wake-up call to take cyber security seriously? Also, find out how Moscow is leading the way in smart city digitisation. And our latest buyer's guide examines customer experience management.

    Download

  • Vishing attacks increasing, but AI's role still unclear

    According to cybersecurity company Trellix, the number of vishing attacks in Q4 2022 increased by 142% from Q3 2022. Although the volume of vishing attacks continues to rise, threat researchers say that the role of AI technology in these attacks may have been overestimated.

    Download

  • DevSecOps delivers better business

    Firms need to consider the move from DevOps to DevSecOps. This e-guide focuses on the benefits of DevSecOps, paints a picture of the rise of this approach, and explains why using the right DevSecOps tools leads to more secure development. DevSecOps delivers better business, and it's time for you to find out how and why.

    Download

  • Computer Weekly - 25 January 2022: Why watching your remote workers doesn't work

    In this week's Computer Weekly, the surge in home working led many firms to mandate use of surveillance software – we look at why it hasn't worked. It's an important year for public sector IT – we examine the trends for 2022. And with robotic process automation (RPA) booming, a Swedish bank explains the benefits. Read the issue now.

    Download

  • Explore strategies to empower your retail loss prevention team

    This eBook explores how loss prevention teams can leverage new tactics, technologies, and approaches to combat retail shrinkage. Learn about RFID, AI analytics, and Verkada's comprehensive security solutions to empower your loss prevention team. Read the full eBook to discover effective strategies.

    Download

  • Computer Weekly – 19 December 2023: The ransomware threat to UK critical infrastructure

    In this week's Computer Weekly, a parliamentary report warns that a lack of ransomware preparedness at the highest levels of government is leaving UK critical national infrastructure dangerously exposed – we analyse the risks. We also examine how AI tools are helping to enhance cloud security. Read the issue now.

    Download

  • UKTech50 2021 - The most influential people in UK technology

    In this e-guide: Computer Weekly has announced the 11th annual UKtech50, our definitive list of the movers and shakers in UK technology – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy.

    Download

  • How to shrink your skills gap like the UAE

    With a tolerant professional culture, the UAE is becoming the technological hub of the Middle East, but lacks a strong technological workforce. Access this expert e-zine to see how these Middle Eastern organizations are bringing in new employees, and see what similar tactics your organization could use in your recruitment efforts as well.

    Download

  • CW Nordics May-July 2020: Startups face tough decisions as coronavirus fallout hits

    Tech startups based in the Nordic region face difficult decisions as the Covid-19 pandemic leads to falling sales and investment.

    Download

  • July ezine: Getting storage right

    An issue looking at what products are in demand now in the storage world and what technologies are coming that need to be embraced by the channel.

    Download