Why Security Training Is Important For Data Protection

Security training involves the use of strategies for protecting data and information through an approach that has been developed by those knowledgeable in security training. High quality security training also includes delivery by trained personnel who are capable of conducting the trainings in compliance with the existing laws and regulations. Security training that is well designed should provide reasonable assurance of the outcome and be continually reviewed for improvements and updates.

Security training is created from IT and business standards and according to the laws and regulations that govern information security. Before security training is delivered by qualified personnel, the training practices are weighed against these standards, laws, and regulations.

Security Training Practices

  • Strategy and Planning: Under strategy and planning, security training is required for personnel before access is granted to the IT infrastructure. The training begins with the introduction of security policies and expectations and is delivered in compliance with the ISO 17799 which is the Code of Practice for Information Security Management.

The staff of an organization is required to review all policies and procedures associated with information security and acknowledge that they have done so.

Following initial training, staff members receive formal security training on an annual basis and are provided with periodic reminders and updates at regular intervals. When possible, multiple points of contact within an organization are designated to emphasize the importance of the security training program.

  • Program Design and Development: Security training in program design and development involves achieving a common level of training among all staff that is identified within the organization. The training is based on staff roles and designed according to each role within the organization.

Security training in program design and development includes training on threats and malicious software, login monitoring, incident reporting, legal and business controls. This type of security training is also based on a specific needs assessment of an organization.

  • Delivery and Administration: Delivery and administration security training involves multiple types of training to accommodate different types of learning and makes the training materials easily accessible to staff with disabilities.

A portion of the training is often dedicated to automation where tools for training and education can be easily provided. Additionally, records pertaining to staff training are maintained in a database that is compliant with the regulations for staff training records. Emphasis is also placed on the importance of information security in the personal life of staff members outside the workplace.

Delivery administration provides an assessment of the effectiveness of the security training program for the purpose of future improvements and updates to the education program and processes.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
86% of email addresses posted on websites are used by spammers to send unsolicited emails?

63% of all "Remove me from your list" requests are not honored.

Spam accounted for 80% of all e-mail received in 2004, up from 62% in 2003