IT Specialist Blogs


News, Topics and Opinions on Information Technology Security

2022 Resolutions - ITS.png

Cybersecurity has always been a difficult subject to understand for both IT professionals and business managers alike. And it has grown increasingly complex due to the advent of modern social engineering schemes. But it doesn’t have to be, particularly with respect to the subject of security awareness—the human aspect of cybersecurity.

Fortunately, there are a growing set of unique tools from select technology vendors that simplify the task of understanding the risks that their staff pose to the organization from a cybersecurity perspective. One such method or effective tool is an employee security survey, which can be conducted when an employee is onboarded within an organization and annually thereafter.

Performing a security awareness assessment is a critical first step in evaluating employees, since they hopefully become your main line of defense against phishing, ransomware, and other social engineering attacks, if professionally trained. So ideally, it is vitally important to identify those employees lacking a proper security posture and to get them in training immediately prior to having any access to the organization’s computing environment.

Equally important, once evaluated, all employees should be continuously trained throughout the year in identifying potential threats such as phishing, downloading attachments and clicking on links within email and web browser apps. But that is a subject for later discussion. The important thing to remember is that the cyberthreat landscape is constantly changing, thus the need for continuous training, or at a minimum, comprehensive annual training.

Finally, since the dawn of cybersecurity or computing humans have been considered the weakest link in the security chain due to their susceptibility to errors, trickery, and deceit. This negative view from the past is now changing with a more positive outlook on the human layer of security. Individuals can be seen as a first line of defense or human firewall against malicious attacks via social engineering, if rigorously evaluated and trained in security awareness.

To learn more about our complimentary IT Specialist Baseline Employee Security Assessment, please refer to the section below.   

Get Your Complimentary Baseline Employee Security Assessment from IT Specialist 

IT Specialist Cybersecurity Services now offers a free employee security assessment that provides you with a starting point to show you where your employees or team members currently stand when it comes to their cybersecurity knowledge. This assessment is delivered via a unique URL to employees, where they’ll answer a series of questions across six distinct categories to gauge their current cybersecurity awareness posture. Those categories include:

  1. General Cybersecurity Knowledge
  2. Phishing Awareness
  3. Password Hygiene
  4. Handling PII
  5. Social Media
  6. Working Remotely

After employees complete their assessment, their results are recorded along with the overall time taken to complete the assessment. Client management is then given a report that provides the average score across all employees who completed the assessment, as well as their individual scores. The report even breaks down each of the six categories to show management where their employees are struggling the most. 

IT Specialist Baseline Employee Security Assessment is non-intrusive, highly informative, and easy to understand.

Showing 0 Comment

Interested in submitting content for publication and syndication on the IT Specialist Network?

As a contributing writer on IT, you can quickly gain exposure as an opinion leader or subject matter expert in information technology with our large audience of technical professionals located around the world. And as an added benefit, our website supports multi-lingual textual translation via Google. We welcome new and established authors that specialize in one or more sectors of the IT industry. Once your article(s) is approved for publication, it will be selectively syndicated on our broader IT Specialist Network or platform. Contact us for details.