Improving your company's cyber security training

被引:0
|
作者
Taylor C. [1 ]
机构
[1] SolarWinds, United States
关键词
D O I
10.12968/S1353-4858(23)70026-3
中图分类号
学科分类号
摘要
Even the best security technology can't eliminate the threats to your organisation. Human error will always present a risk. It's important, then, that every organisation takes a careful look at its cyber security training to determine whether it's up to the job. © 2023 MA Business Ltd.
引用
下载
收藏
相关论文
共 50 条
  • [21] Improving your training program
    Immel, BK
    BIOPHARM-THE APPLIED TECHNOLOGIES OF BIOPHARMACEUTICAL DEVELOPMENT, 1999, 12 (08): : 31 - 34
  • [22] Improving the Cyber Security of SCADA Communication Networks
    Patel, Sandip C.
    Bhatt, Ganesh D.
    Graham, James H.
    COMMUNICATIONS OF THE ACM, 2009, 52 (07) : 139 - 142
  • [23] Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security
    Yeboah-Ofori, Abel
    Islam, Shareeful
    Lee, Sin Wee
    Shamszaman, Zia Ush
    Muhammad, Khan
    Altaf, Meteb
    Al-Rakhami, Mabrook S.
    IEEE ACCESS, 2021, 9 : 94318 - 94337
  • [24] How do you select the "right" security feature(s) for your company's products???
    Pickett, GE
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES II, 1998, 3314 : 52 - 58
  • [25] MODELLING OF MARITIME CYBER SECURITY EDUCATION AND TRAINING
    Kayisoglu, Gizem
    Bolat, Pelin
    Duzenli, Emre
    PEDAGOGIKA-PEDAGOGY, 2023, 95 (06): : 64 - 78
  • [26] Cyber range cyberium for training security meisters to deal with cyber attacks
    Hara, Kazuhiro
    Fujitsu Scientific and Technical Journal, 2019, 55 (05): : 59 - 63
  • [27] Cyber-Security Training Evaluation Metrics
    Koutsouris, Nikolaos
    Vassilakis, Costas
    Kolokotronis, Nicholas
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 192 - 197
  • [28] Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyber Attacks
    Hara, Kazuhiro
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2019, 55 (05): : 59 - 63
  • [29] Log Analysis of Cyber Security Training Exercises
    Abbott, Robert G.
    McClain, Jonathan
    Anderson, Benjamin
    Nauer, Kevin
    Silva, Austin
    Forsythe, Chris
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 5088 - 5094
  • [30] A video game for cyber security training and awareness
    Cone, Benjamin D.
    Irvine, Cynthia E.
    Thompson, Michael F.
    Nguyen, Thuy D.
    COMPUTERS & SECURITY, 2007, 26 (01) : 63 - 72