How To Do Security Awareness Training for Remote Employees

Posted by graham.westbrook
April 20, 2020

Share Article

Waging culture change is not an easy task. Trying to do that remotely feels near-impossible. But there is a way: online training experiences that increase retention AND engagement. 

Identify Learning Objectives

First, identify learning objectives that are most important for training your remote employees. Your content needs to be focused on these specific risk areas to be most effective. For example,

  1. Combat Phishing, Spear-Phishing, Vishing and Smishing by identifying red flags that social engineers leave behind;
  2. Secure a WFH Workspace;
  3. Learn proper data classification;
  4. Change default credentials and protect IoT Devices;
  5. Report Insider Threats and Cyber Criminals;
  6. Learn 10 fundamentals of Security Awareness.

Select Training Styles

Second, select a training style you feel would appeal to remote employees. For example,

  • Training Scenario 1 (Traditional): Training could begin with a remote meeting presentation. The slide deck could focus on social engineering, specifically how cybercriminals use SMS-based phishing (smishing) and voice-phishing (vishing) to target people working from home. Then, training may continue with online fraud prevention, to help people identify COVID-themed scams or stimulus-related fraud. Training could conclude with cyber hygiene tips on how to work securely online, using trusted WiFi and VPNs, and how to report suspicious activity while working from home. 
  • Training Scenario 2 (Game-based learning): If your employees are clawing up the walls going crazy, can't go outside, and are trapped inside their own heads… you may consider doing something productive AND collaborative. Here at Living Security, we just launched a new digital escape room that kicks off with an exciting storyline - and ends with a fantastic debriefing session to stay engaged with a remote team of employees.

Bask in the Results

Subscribe To Learn How To Prevent Cybersecurity Breaches

Additional Reading