Solved

User Awareness Training

Posted on 2009-06-30
5
304 Views
Last Modified: 2012-05-07
Hi all, we have just revised our security awareness training programme. In our organisation (small setup) as part of a new starters we give them basic IT security awareness training, i.e. password good practice, awareness for social engineering, shoulder surfing etc.

We have got a 3rd party external audit coming in soon and I wonder what sort of things they will pick us up on. Have you had similar audits, i..e them auditing you that you are training your staff properly. What sort of things did they ask, recommend, highlight in there testing and findings?

In terms of documentation our training programme is documented, we record users attendance etc, we dont allow exceptions i.e. a corporate director still has to have it etc. Anything we are likely to have to do in addition to satisfy the external auditors?
0
Comment
Question by:pma111
  • 3
  • 2
5 Comments
 
LVL 18

Expert Comment

by:kjanicke
ID: 24750990
Documentation, awareness, and auditing were key elements in our inspection which was held just a few weeks ago.

If you have a policy of not allowing wireless devices or cell phones in the building, do you actively seek those devices?  If company policy doesn't allow you to surf ebay at work, can you tell who is surfing ebay?  

What types of things do you audit, and do people actually look at the audits?

Proper markings (to the letter) of any regulation you have.  Are portable hard drives encrypted or allowed?

Do you have documented procedures for minor incidents and major disasters?  If you found somebody stealing computer hardware, do the other employees know what to do and who to contact?  Do your employees know where that documentation is?
0
 
LVL 3

Author Comment

by:pma111
ID: 24752181
Thanks kjanicke, what documentation did they ask you specific to training, was it training records or lots more? Regards
0
 
LVL 18

Accepted Solution

by:
kjanicke earned 250 total points
ID: 24752899
They did ask for signed copies of our authorized user policy.  It was some of the basic rules such as sharing passwords, surfing unprofessional web sites, usingt he computer for personal entertainment or profit, etc.

But they also asked how we were preventing or audting the policy.

Having a central location for all documentation helped, but quite a few folks didn't know where it was, and there was almost too much stuff there.  Some documentation wa sn't updated in years.
0
 
LVL 3

Author Comment

by:pma111
ID: 24752904
Thanks ever so much, some good advice. Cheers
0
 
LVL 18

Expert Comment

by:kjanicke
ID: 24757899
Thanks
0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Admin Certificates in my browser 2 43
Rensome / malware protection 9 74
Fraud Email 11 42
ow do I browse the internet secretly? 6 56
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question