eduHEZO – How to recognize cyber threats?
Fraud, theft or kidnapping for ransom - these are phenomena that are no stranger to us.
Over recent years, they have been constantly changing and improving. Each of these activities has existed and continues to exist in very simple, but also very sophisticated versions.
Scammers, thieves and kidnappers operate constantly, and the number of "operations" they perform increases every year. Such activities are less and less performed in the real world. Criminals have moved to the Internet and the virtual zone, where they act more boldly and more dangerously than ever before.
This activity has been moved to the virtual zone and no longer has physical boundaries.
In the cyber world, geographical distance does not matter. A hacker from the other side of the globe is as close to us in the virtual sphere as our children or colleagues in the next room. Equally important as having physical security measures (in the form of a firewall, UTM, email protection systems and a backup system) is awareness of the threats to which users (employees) are exposed. Most attacks are directed against them.
Always in the middle between the first line of defense (firewalls) and the last resort (backup) there is the most sensitive and susceptible element - HUMAN = USER. It is the human mind that is the least resistant to "disturbances", the most difficult to update it and ensure that learned policies are always implemented with the same certainty.
One of the most important actions to combat cyber threats is currently the education of non-technical employees who serve customers and use computers, mobile devices and telephones.
These trainings focus on raising awareness of threats and developing the habit of being suspicious of all interactions on the Internet.
Effective education should be conducted in a manner adapted to the capabilities and available time of users.
eduHezo is a service based on the ProofPoint Security Awareness platform, providing a comprehensive training process including:
- management and support of the entire educational cycle
- coordination and supervision of the process
- current reporting of implementation status
- participant-targeted phishing campaigns
- certificates
and additionally:
- supplementary training modules for users who "catch the rod"
- repeats of training for participants who were unable to complete them or want to complete them again.
eduHEZO – How to recognize cyber threats?
Over 50 interactive training courses available in Polish, divided into categories:
- email security
- phishing
- Internet safety
- social engineering
- work safety
- personal data
- legal regulations