Internet Security Awareness Training Basics



A great many “teaching stories” from various traditions emphasize how the press of daily life, or normal human emotions, can crowd out and turn off common sense. At its core foundation, Internet security awareness relies on people’s abilities to stop and think before they act. Of course, this isn’t always possible, so it’s also advisable to erect as many other automated defenses as possible on behalf of Internet users: anti-malware, e-mail screening, URL and content filtering, comprehensive firewall rules, and so on and so forth.



But at some level, users must be allowed to venture out of their safe havens on their own hard disks, and corporate intranets, so that they can do their jobs properly. Once they leave those protected precincts — and whenever they deal with information that comes from outside those boundaries — they must be taught to stop and think before they interact with Web sites, e-mails, Twitter feeds, and the plethora of software and services presented to them daily on social networking sites. If users can learn to apply four simple rules, they can avoid 99% of the sources from whence attacks occur, no matter how subtle or carefully couched they may be to catch the unwary or unwitting:



  1. Never click links in unsolicited, unexpected, or unwanted e-mail: this is how phishing begins, and is far too often enough to enable malefactors to establish a beachhead on user systems


  2. Never open unexpected e-mail attachments, even if they appear to come from someone you know very well: this is how many attacks occur, simply because users don’t stop to think that a celebrity photo or surprise RFP may indeed contain surprises above and beyond what shows up on their screens


  3. Never download software from anything other than a major, well-known, reputable source: this means only from vendor sites and well-known sites (like CNET/
download.com; File Hippo, or SourceForge.net).

  • Never click links on unknown or un-vetted Web sites to download anything: this is the Web-based equivalent of a link in a phishing e-mail. Tell your users they don’t want to go there, and you don’t want them to go there, either.




  • Regular reminders and check-ups are also a good idea to keep users on their toes, and to provide constant input that they must always “stop and think” before they act — or click, or download – on the Internet. If they can remember the four basic rules outlined above, they will steer clear of most sources of trouble, and the human element in your security perimeter will become more secure.



    Stu Sjouwerman



    Subscribe to Our Blog


    Comprehensive Anti-Phishing Guide




    Get the latest about social engineering

    Subscribe to CyberheistNews