
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Security Awareness For Dummies
About this book
Make security a priority on your team
Every organization needs astrongsecurity program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it'sincreasingly necessarytohave not just awidely accessible gold standard of security, but alsoa practical plan for rolling it outand getting others on board with following it. Security AwarenessForDummies gives you the blueprint for implementing this sort of holistic and hyper-secureprograminyour organization.
Written by one of the world's most influential security professionalsâand an Information Systems Security Association Hall of Famerâthis pragmatic andeasy-to-followbook provides a frameworkfor creatingnew and highly effective awareness programs fromscratch, as well assteps to taketoimprove on existingones. It also covershow to measure andevaluate the successofyourprogramandhighlightits valueto management.
- Customize and create your own program
- Make employees aware of the importance of security
- Develop metrics for success
- Follow industry-specific sample programs
Cyberattacks aren't going away anytime soon: get this smart, friendly guideon how to get a workgroup on board with their role in securityand save your organization big moneyin the long run.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Getting to Know Security Awareness
Knowing How Security Awareness Programs Work




Understanding the Benefits of Security Awareness
Reducing losses from phishing attacks
- Sony: The infamous 2014 Sony hack, which was reportedly perpetrated by North Korea, began with a phishing attack. The hack resulted in the leak of information about movies, the movies themselves, and embarrassing emails. Sony reported costs of the hack to be $35 million.
- Target: The 2013 Target hack, which compromised more than 110 million credit card numbers and consumer records, began with a phishing attack of a Target vendor. Target reported the resulting costs to be $162 million.
- OPM: The attack on the Office of Personnel Management (OPM), discovered in 2014, which compromised the security clearance files of 20 million US government employees and contractors, began with a phishing attack against a government contractor. The costs and losses are immeasurable because this attack is considered a major intelligence success for China, the perpetrator of the attack named by the US government.
- Colonial Pipeline: The Colonial Pipeline ransomware attack in 2021 began with a phishing message that captured user credentials and allowed the criminals to establish a sustained presence on the network. This allowed the criminals to find the most critical systems and eventually install the ransomware, which caused Colonial Pipeline to shut down the pipeline, halting a primary oil delivery to the US east coast. Colonial Pipeline paid the criminals approximately $4.4 million, but the actual costs resulting from the shutdown were tens of millions of dollars to Colonial Pipeline and an incalculable cost to the economy.
Reducing losses by reducing risk
Grasping how users initiate loss
Knowing How Security Awareness Programs Work
Table of contents
- Cover
- Title Page
- Table of Contents
- Introduction
- Part 1: Getting to Know Security Awareness
- Part 2: Building a Security Awareness Program
- Part 3: Putting Your Security Awareness Program Into Action
- Part 4: The Part of Tens
- Appendix: Sample Questionnaire
- Index
- About the Author
- Advertisement Page
- Connect with Dummies
- End User License Agreement


