www.trustwave.com
Open in
urlscan Pro
52.151.96.240
Public Scan
Submitted URL: https://info.trustwave.com/e3t/Ctc/5F+113/d2vn8X04/VWtLQQ6-q_-6VH_6tF5vMz81W178YCN50hTX0N7Rflx55nClfV3Zsc37CgT6WW3kTj8X4NlQ...
Effective URL: https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/security-awareness-101-creating-a-compelling-security-aware...
Submission: On June 27 via api from LK — Scanned from DE
Effective URL: https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/security-awareness-101-creating-a-compelling-security-aware...
Submission: On June 27 via api from LK — Scanned from DE
Form analysis
8 forms found in the DOMGET /en-us/search/
<form oninput="autoSuggest(q.value)" method="get" target="_self" action="/en-us/search/" _lpchecked="1" data-hs-cf-bound="true">
<div class=" site-header-search-mobile" id="search-box">
<i class="fe fe-search text-darkest"></i>
<input id="search" value="" type="text" class="form-control" name="q" placeholder="Search trustwave.com" autocomplete="off">
<div id="search-bar">
<ul class="ul-list list-unstyled result-list" id="suggestresults"></ul>
</div>
</div>
</form>
GET /en-us/search/
<form method="get" target="_self" action="/en-us/search/" data-hs-cf-bound="true">
<div class="site-header-search-main">
<i class="fe fe-search text-darkest"></i>
<input type="text" class="form-control form-control-lg" id="q" name="q" placeholder="Search trustwave.com">
</div>
</form>
<form id="navdemo-form" class="modal pt-9" style="max-height:90vh; width:90%; margin:auto 0;" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "92358282-9e9e-4fe6-a21f-c30c1e55336d",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-a2053cb9-5bcb-488b-a752-853b6d78b0bd" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-0" class="hs-form-iframe" title="Form 0" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="demo-form" class="modal" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "cfc901a2-eafd-46d4-a988-cdec75f02fd1",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-83c916c2-b207-40d1-9554-581d6be21439" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-1" class="hs-form-iframe" title="Form 1" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="demo-form" class="modal pt-9" style="max-height:90vh; width:90%; margin:auto 0" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "cfc901a2-eafd-46d4-a988-cdec75f02fd1",
sfdcCampaignId: "7016e0000020JvOAAU"
});
</script>
<div id="hbspt-form-b1a7f0bd-93aa-4962-bf47-5fd561aab4df" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-2" class="hs-form-iframe" title="Form 2" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
<form id="partner-form" class="modal pt=9" style="max-height:90vh; width:90%; margin:auto 0" data-hs-cf-bound="true">
<script charset="utf-8" type="text/javascript" src="//js.hsforms.net/forms/embed/v2.js"></script>
<script data-hubspot-rendered="true">
hbspt.forms.create({
region: "na1",
portalId: "21158977",
formId: "de7ea1d6-a749-4248-88db-dc813310bec6",
sfdcCampaignId: "7016e0000020A3BAAU"
});
</script>
<div id="hbspt-form-6511716c-a072-4ded-a376-5c3de53c9700" class="hbspt-form" data-hs-forms-root="true"><iframe id="hs-form-iframe-3" class="hs-form-iframe" title="Form 3" scrolling="no" width="100%"
style="position: static; border: none; display: block; overflow: hidden; width: 100%;"></iframe></div>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21158977/68741a11-8e56-4f23-ba7f-b2307e77714c
<form id="hsForm_68741a11-8e56-4f23-ba7f-b2307e77714c" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/21158977/68741a11-8e56-4f23-ba7f-b2307e77714c"
class="hs-form-private hsForm_68741a11-8e56-4f23-ba7f-b2307e77714c hs-form-68741a11-8e56-4f23-ba7f-b2307e77714c hs-form-68741a11-8e56-4f23-ba7f-b2307e77714c_8799e33e-2fac-4282-a9f4-72808110680d hs-form stacked"
target="target_iframe_68741a11-8e56-4f23-ba7f-b2307e77714c" data-instance-id="8799e33e-2fac-4282-a9f4-72808110680d" data-form-id="68741a11-8e56-4f23-ba7f-b2307e77714c" data-portal-id="21158977" data-hs-cf-bound="true">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-68741a11-8e56-4f23-ba7f-b2307e77714c" class="" placeholder="Enter your " for="email-68741a11-8e56-4f23-ba7f-b2307e77714c"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-68741a11-8e56-4f23-ba7f-b2307e77714c" name="email" placeholder="Business Email" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1687896814736","formDefinitionUpdatedAt":"1674512136291","lang":"en","embedType":"REGULAR","renderRawHtml":"true","userAgent":"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0","pageTitle":"Security Awareness 101: Creating a Compelling Security Awareness Program | Trustwave","pageUrl":"https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/security-awareness-101-creating-a-compelling-security-awareness-program/?utm_campaign=NWS%20Trustwave%20Digest&utm_medium=email&utm_content=264045642&utm_source=hs_email","urlParams":{"utm_campaign":"NWS Trustwave Digest","utm_medium":"email","utm_content":"264045642","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":false,"hutk":"bb7be94603cb9f8eb1d86dfdad0d31f5","__hsfp":3518565405,"__hssc":"94548739.1.1687896818331","__hstc":"94548739.bb7be94603cb9f8eb1d86dfdad0d31f5.1687896818330.1687896818330.1687896818330.1","formTarget":"#hbspt-form-8799e33e-2fac-4282-a9f4-72808110680d","locale":"en","timestamp":1687896818347,"originalEmbedContext":{"portalId":"21158977","formId":"68741a11-8e56-4f23-ba7f-b2307e77714c","region":"na1","target":"#hbspt-form-8799e33e-2fac-4282-a9f4-72808110680d","isBuilder":false,"isTestPage":false,"isPreview":false,"isMobileResponsive":true},"correlationId":"8799e33e-2fac-4282-a9f4-72808110680d","renderedFieldsIds":["email"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3372","sourceName":"forms-embed","sourceVersion":"1.3372","sourceVersionMajor":"1","sourceVersionMinor":"3372","_debug_allPageIds":{},"_debug_embedLogLines":[{"clientTimestamp":1687896814966,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Security Awareness 101: Creating a Compelling Security Awareness Program | Trustwave\",\"pageUrl\":\"https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/security-awareness-101-creating-a-compelling-security-awareness-program/?utm_campaign=NWS%20Trustwave%20Digest&utm_medium=email&utm_content=264045642&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0\",\"urlParams\":{\"utm_campaign\":\"NWS Trustwave Digest\",\"utm_medium\":\"email\",\"utm_content\":\"264045642\",\"utm_source\":\"hs_email\"},\"isHubSpotCmsGeneratedPage\":false}"},{"clientTimestamp":1687896814968,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1687896818343,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"bb7be94603cb9f8eb1d86dfdad0d31f5\"}"}]}"><iframe
name="target_iframe_68741a11-8e56-4f23-ba7f-b2307e77714c" style="display: none;"></iframe>
</form>
<form data-hs-cf-bound="true"></form>
Text Content
Trustwave Action Response: Zero Day Vulnerability in Barracuda Email Security Gateway Appliance (CVE-2023-2868). Learn More * Contact Us * Login Login Fusion Platform Login What is the Trustwave Fusion Platform? * MailMarshal Cloud Login * Incident Response Incident Response EXPERIENCING A SECURITY BREACH? Get access to immediate incident response assistance. 24 HOUR HOTLINES * AMERICAS +1 855 438 4305 * EMEA +44 8081687370 * AUSTRALIA +61 1300901211 * SINGAPORE +65 68175019 Recommended Actions * * Services Services * Managed Detection & Response Eradicate cyberthreats with world-class intel and expertise * Managed Security Services Expand your team’s capabilities and strengthen your security posture * Consulting & Professional Services Tap into our global team of tenured cybersecurity specialists * Penetration Testing Subscription- or project-based testing, delivered by global experts * Database Security Get ahead of database risk, protect data and exceed compliance requirements * Email Security & Management Catch email threats others miss with layered security & maximum control * Co-Managed SOC (SIEM) Eliminate alert fatigue, focus your SecOps team, stop threats fast, and reduce cyber risk View All Trustwave Services * Solutions Solutions BY INDUSTRY * Education * Financial Services * Government * Healthcare * Hotels * Legal * Manufacturing * Retail BY REGULATION * Data Privacy * CMMC * FISMA * GDPR * GLBA * HIPAA * ISO * SOX BY TOPIC * Microsoft Exchange Server Attacks Stay protected against emerging threats * Rapidly Secure New Environments Security for rapid response situations * Securing the Cloud Safely navigate and stay protected * Securing the IoT Landscape Test, monitor and secure network objects * Why Trustwave Why Trustwave * The Trustwave Approach A focus on threat detection and response * Awards and Accolades Recognition by analysts and media outlets * Trustwave SpiderLabs Team Researchers, ethical hackers and responders * Trustwave Fusion Platform Unprecedented security visibility and control * SpiderLabs Fusion Center Our cybersecurity command center * Security Operations Centers Distributed worldwide defense nodes * Partners Partners * Technology Alliance Partners Key alliances who align and support our ecosystem of security offerings * Trustwave PartnerOne Program Join forces with Trustwave to protect against the most advance cybersecurity threats * Register Login * Resources Resources BLOGS * Trustwave Blog * SpiderLabs Blog UPCOMING * Webinars * Events MEDIA & ASSETS * Document Library * Video Library * Analyst Reports * Webinar Replays * Case Studies * Trials & Evaluations NOTICES * Security Advisories * Software Updates HELP * Contact * Support * * Request a Demo Loading... BLOGS & STORIES TRUSTWAVE BLOG The Trustwave Blog empowers information security professionals to achieve new heights through expert insight that addresses hot topics, trends and challenges and defines best practices. TIPS & TRICKS SECURITY AWARENESS 101: CREATING A COMPELLING SECURITY AWARENESS PROGRAM access_timeJune 20, 2023 share * * * There is no downside for an organization to have a security awareness program in place. It may not be 100% effective in stopping workers from making an error and causing a cyber incident, but like any preventative endeavor such a program can reduce the possibility of a disastrous cyber incident from occurring. An organization’s staff is on the front line when it comes to defending their place of work. Kind of a human firewall, if you will. Employees who are educated about various security risks and best practices act as a critical line of defense. Once trained these people can identify and respond to potential threats, such as phishing emails, suspicious attachments, or unauthorized access attempts. THE NEED FOR A WELL-TRAINED STAFF This training is particularly important in a world where email is a primary attack vector. The FBI’s 2022 Internet Crime Report noted business email compromise attacks were responsible for $2.5 billion in losses with phishing attacks resulting in another $52.1 million. Surely, it is important to teach workers what to be aware of what is coming into their inbox. There are additional, non-cybersecurity, related reasons for having a well-trained staff. Most industries have to abide by a mountain of regulatory practices. Whether it’s HIPPA in healthcare, GPDR/CCPA compliance or PCI DSS for retailers. Failure to comply with these requirements can result in hefty fines, legal consequences, and damage to the company's reputation. By establishing a Security Awareness Program, companies can demonstrate their commitment to regulatory compliance and data protection. The result of a well-implemented training program the creation of a security culture inside the organization. When security becomes a shared responsibility and a core value, employees become more proactive in identifying and reporting security incidents, adhering to security policies, and embracing security as an integral part of their daily work routines. A strong security culture helps create a resilient and security-conscious workforce. SECURITY AWARENESS 101 Creating an awareness program is not easy. Not every person will take the training seriously and many will simply forget what they are taught. Establish advocates and achieve buy-in: Gain support from top management and form a steering committee with representatives from various departments, including marketing and communications professionals, to help craft clear messaging and objectives. Narrow your focus: Instead of overwhelming employees with numerous security topics, identify the most relevant themes that address the greatest risks specific to your organization and departments. Consider customizing training materials with the help of security companies like Trustwave. Establish advocates and achieve buy-in: Gain support from top management and form a steering committee with representatives from various departments, including marketing and communications professionals, to help craft clear messaging and objectives. Narrow your focus: Instead of overwhelming employees with numerous security topics, identify the most relevant themes that address the greatest risks specific to your organization and departments. Consider customizing training materials with the help of security companies like Trustwave. Connect to real-life attacks: Use concrete examples of security breaches and other incidents to demonstrate the relevance and urgency of security awareness efforts. Show real-time attacks happening on networks to emphasize the potential consequences. Make it about them: Relate security topics to employees' personal lives by highlighting how the knowledge and skills they gain can protect their own online activities, such as password management, mobile device security, and social media usage. Execute mock attacks to establish effectiveness: Conduct simulated social engineering attacks, such as phishing tests, to assess the effectiveness of the awareness program. Communicate the plans in advance to maintain surprise and prevent employees from feeling violated. Raise their emotional commitment: Help employees understand the potential harm that can result from poor security practices and clearly communicate the level of risk associated with their actions. Connect their individual behaviors to the overall well-being of the company. Be flexible: Customize the message for different employee groups, considering their specific roles, responsibilities, and perceived needs. Some groups may require tailored training to address their unique security challenges. Reward the top performers: Use incentives and gamification techniques to encourage positive security behaviors. For example, award points or prizes to employees who identify and report phishing attempts or engage in responsible security practices. Address unsafe behaviors as well to maintain accountability. Reinforce the message: Avoid conducting training courses only once a year. Provide regular refresher sessions, use mediums like blogs, posters, and newsletters to reinforce key points, and integrate security awareness into the ongoing communication channels of the organization. HOW TRUSTWAVE SECURITY COLONY CAN HELP Security Colony is a powerful self-service resource for CISOs and management that gives them direct access to a variety of security and training tools that will allow them to self-diagnose problem or help improve their staff’s ability to deal with cybersecurity issues. A Security Colony subscription varies in cost depending upon the level of service required and there is also a basic free version available. The Security Colony Resource and Video Library – This area is where CISOs can go for off the shelf training aids. The Security Colony Resource Library contains 17 categories covering almost 400 topics. Trustwave has created all the documentation based on actual work we've conducted for organizations which we then make available to our subscribers. Security Colony's Video Library contains a wealth of information for folks looking for an introductory lesson on a particular topic, say phishing or identifying an insecure WiFi connection. Senior Trustwave consultants present the videos. While not specifically a training tool, the Security Colony Maturity Assessment is a self-paced tool that will measure if an organization's security can defeat today's cyber threats. The threat assessment analyzes your industry and the nature and size of your business. It uses NIST Cyber Security Framework to assess your ability to identify, protect, detect, respond and recover appropriately to maintain a suitable level of security. Click the image above for direct access to Security Colony’s services. RELATED TRUSTWAVE BLOGS PART 2: PREPARING THE BOARD OF DIRECTORS FOR THE SEC'S UPCOMING CYBERSECURITY COMPLIANCE REGULATIONS Tips & Tricks THE TRUSTWAVE ADVANTAGE: WE DETECT WHAT OTHERS CAN'T Emerging Threats 5 WAYS CISOS CAN LEVERAGE THE POWER OF TRUSTWAVE SECURITY COLONY Perspectives STAY INFORMED Sign up to receive the latest security news and trends from Trustwave. * Leadership Team * Our History * News Releases * Media Coverage * Careers * Global Locations * Awards & Accolades * Trials & Evaluations * Contact * Support * Security Advisories * Software Updates * Legal * Terms of Use * Privacy Policy * Copyright © 2023 Trustwave Holdings, Inc. All rights reserved. Loading HELP US STOP THE ROBOT UPRISING This is a bot-free zone. Please check the box to let us know you're human. THANK YOU Download Now -------------------------------------------------------------------------------- Read complimentary reports and insightful stories in the Trustwave Resource Center THANK YOU One of our sales specialists will be in touch shortly. -------------------------------------------------------------------------------- Read complimentary reports and insightful stories in the Trustwave Resource Center We use cookies to provide you a relevant user experience, analyze our traffic, and provide social media features. Privacy Policy GOT IT PREFERENCE CENTRE When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices PREFERENCE CENTRE When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices