Skip to main content

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees.
Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:

1.      Authentication
The most basic network security measure that your employees need to use is a password authentication: Ensure that every employee who uses a computer has a strong password set so that unauthorized persons cannot get access to their computer and interfere or steal sensitive information; which no one else should have in the company apart from the authorized employees.

2.     Data Backup
Data backup is one of the most effective cyber and network security measure to put in place. Train your employees on the importance of backing up sensitive data in their computers, and different ways to backup those data. Provide them with data backup devices that can be stored separately from the computers, so that you don't lose sensitive data if anything bad happens. A number of companies have at one time lost important data through formatting of hard disk, virus attack, corrupt files, and damaged storage devices: And you don't want to be one of them since the cost of data recovery services has really gone up today.

3.     Software Installation
First thing on software installation, ensure that your employees always keep their computers clean by not installing software that are irrelevant to your company's success: There are a number of malicious software on the internet that install in a computer in form of a virus, which might be dangerous enough to erase all your data and information from a computer. You should make it clear to all the employees that matters of software installation are strictly duties of IT staffs, and no one should install any software in the computers that are meant for work. On the other hand, you can implement this by making sure strong passwords are set for one to be able to install any software on the hard disk of your computers.

More importantly, ensure that all your computers are using up-to-date software by doing regular software updates. Also, ensure that you install anti-virus software that is effective, to protect your computers from internet virus and viruses that may have access to computers through removable storage devices like flash drives and SD cards.

4.     Invest on New Technologies and Train Employees
The last thing, but not least; ensure that you only invest on the latest technologies that are relevant to the security of your company. For instance, you can replace old computers with new ones that are more advanced in security issues; moreover, you can also invest on network security enhancing devices such as routers that come with firewalls to prevent any hackers from accessing your data from a remote computer. However, to get good results with new technologies, you need to train your employees so that you don’t interfere with their performance with new technologies that they don't know how to use.


  1. Hi there very nice site!! Guy .. Excellent .. Amazing .. I'll bookmark your site and take the feeds also? I am glad to search out numerous useful info here in the post, we'd like develop extra strategies in this regard, thanks for sharing. . . . . . gmail log in


Post a Comment

Popular posts from this blog

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…

HCI: Research Topic Ideas

I was reading an interesting research paper (Personal Tasks at Work: An Exploration, ACM 2017) in which the writer talks about the personal tasks that we have to do at work such as scheduling appointments, paying electricity and other bills, etc. The problem at first seems to be a social science one which has nothing to do with computer science but when looked closely the problem highlights an important aspect of our daily life that has to be sorted out using technology. The paper basically discusses those tasks and categorizes them based on frequency of occurring based on a survey. So, for example out of the 93 people who participated in the survey presented in the paper, 51% reported a need for scheduling an appointment while 33% have to coordinate their personal activities. Some will say (specially management science guys) that few of the problems can be solved by proper time management but remember that the purpose of technology is to make life easier for humans. Also, not every …