Computer Sciences and Information Technology
Topic:
The importance of security awareness training

Several methods and initiatives can be utilized by an organization to ensure that employees have a solid understanding of the organization’s security policy, procedure, and practices. They include awareness, which involves activities designed to change the behavior of employees to align with the organization’s security policy, procedure, and practices. The organization can also conduct training to provide security skills in specific sectors to employees, ensuring that they can operate and understand security functions in their respective workstations (Barman, 2001). The organization can also use educational methods to ensure employees solidly understand the security policy, procedure, and practices. Education is regarded as a top-level knowledge development method that will require more in-depth schooling in terms of the organization’s applied security factors.
To enhance employee awareness of the importance of information security, the organization should use reading materials, such as security policy newspapers, posters, handbooks, and web sites. Some of the reading materials can be availed to employees through their emails and the organization’s employee portal. The other method that can be used is the policy-based, whereby the organization sends warning messages to employees failing or who have not yet adhered to or violated the security policy (Alotaibi & Alfehaid, 2019). The organization can also deploy event-based initiatives, which are special events conducted to enhance employee security awareness through face-to-face training, induction training, test and quizzes, and automated questioners. The video-based method can also be used to attend or receive visual aids, such as video-based training sessions and videotapes. Another method of enhancing employee information security awareness is message awareness tools (Trinket). The method involves promoting information security awareness through items or tools used by employees at the workplace, including pens, clocks, key fobs, and notepads.

References
Alotaibi, M., & Alfehaid, W., 2019. Information Security Awareness: A Review of Methods, Challenges and Solutions. Conference: Internet Technology and Secured Transactions (ICITST-2018). DOI: 10.2053/ICITST.WorldCIS.WCST.WCICSS.2018.0016
Barman, S, 2001. Writing Information Security Policies. Pearson Education, Informit

Published by
Essays
View all posts