{
    "id": 4579,
    "date": "2023-08-31T13:03:11",
    "date_gmt": "2023-08-31T06:03:11",
    "guid": {
        "rendered": "https:\/\/cybersec.co.th\/?page_id=4579"
    },
    "modified": "2023-08-31T13:06:34",
    "modified_gmt": "2023-08-31T06:06:34",
    "slug": "security-awareness-training",
    "status": "publish",
    "type": "page",
    "link": "https:\/\/cybersec.co.th\/en\/security-awareness-training\/",
    "title": {
        "rendered": "Security Awareness Training"
    },
    "content": {
        "rendered": "<div data-elementor-type=\"wp-page\" data-elementor-id=\"4579\" class=\"elementor elementor-4579\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-43e4fcd ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"43e4fcd\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:1397,&quot;url&quot;:&quot;https:\\\/\\\/cybersec.co.th\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/bg-maps.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c5529e9 ot-flex-column-vertical\" data-id=\"c5529e9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ecfa4fe elementor-widget elementor-widget-image\" data-id=\"ecfa4fe\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"461\" src=\"https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-768x461.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4581\" alt=\"\" srcset=\"https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-768x461.jpg 768w, https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-300x180.jpg 300w, https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-18x12.jpg 18w, https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-720x432.jpg 720w, https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know-800x480.jpg 800w, https:\/\/cybersec.co.th\/wp-content\/uploads\/2023\/08\/cybersecurity-awareness-training-for-employees-all-you-need-to-know.jpg 1000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60afbe61 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60afbe61\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;slideshow&quot;,&quot;background_slideshow_gallery&quot;:[{&quot;id&quot;:1397,&quot;url&quot;:&quot;https:\\\/\\\/cybersec.co.th\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/bg-maps.jpg&quot;},{&quot;id&quot;:1624,&quot;url&quot;:&quot;https:\\\/\\\/cybersec.co.th\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/bg-maps-dots-alt.jpg&quot;}],&quot;background_slideshow_loop&quot;:&quot;yes&quot;,&quot;background_slideshow_slide_duration&quot;:5000,&quot;background_slideshow_slide_transition&quot;:&quot;fade&quot;,&quot;background_slideshow_transition_duration&quot;:500}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc9503f ot-flex-column-vertical\" data-id=\"cc9503f\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-135be8b elementor-widget elementor-widget-heading\" data-id=\"135be8b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-family: Roboto, Roboto;font-size: 24px\">Cybersecurity Awareness Training<\/span><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fde8c24 elementor-widget elementor-widget-text-editor\" data-id=\"fde8c24\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Cyberattacks don\u2019t differentiate between organisation industry, type or size. Everyone is a target and vulnerable to attacks like phishing, social engineering and ransomware, and we\u2019re all only as strong as our weakest link. How would your organisation be impacted if your sensitive data was lost or stolen or your systems shut down, and you were unable to conduct business?<\/p><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Cybersecurity Awareness Training is no longer optional. Helping your team protect themselves and your business from potentially massive financial losses and reputational damage is essential. Regardless of the framework, standard or best practice; keeping staff informed of security threats is a win-win scenario.<\/p><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto;\">We offer general security awareness training and tailored programs to suit your needs:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ed068a ot-layout_block elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ed068a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2bef6ca ot-flex-column-vertical\" data-id=\"2bef6ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0af736b elementor-widget elementor-widget-heading\" data-id=\"0af736b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h3 style=\"font-family: Roboto, Roboto;font-weight: 400;line-height: 1.1;margin-bottom: 10px;font-size: 21px\"><span><span style=\"font-weight: 700\">Benefits of Cybersecurity Awareness Training<\/span><\/span><\/h3><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4633f49 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4633f49\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-433c9e0 ot-flex-column-vertical\" data-id=\"433c9e0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66d39a7 elementor-widget elementor-widget-text-editor\" data-id=\"66d39a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul style=\"margin-bottom: 10px; color: #000000; font-family: Roboto, Roboto;\"><li>Improve general security awareness<\/li><li>Learn techniques that will protect your company<\/li><li>Train your staff with corporate policies and processes<\/li><li>Improve the organisations\u2019 resilience and response to attacks, thus minimising business impacts<\/li><li>Assess their understanding with tests<\/li><li>Meet compliance requirements such as ISO 27001 clause 7.2.2.<\/li><li>Get your employees certified<\/li><li>Updated to include latest threats and techniques used by cyber criminals<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4e83914 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e83914\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b139fc ot-flex-column-vertical\" data-id=\"3b139fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cf37ae elementor-widget elementor-widget-text-editor\" data-id=\"8cf37ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"font-family: Roboto, Roboto; font-weight: 400; line-height: 1.1; color: #c10d2e; margin-top: 30px; margin-bottom: 10px; font-size: 18px;\"><span style=\"font-weight: bold;\"><span style=\"color: #2980b9;\">Why Cybersecurity Training?<\/span><\/span><\/h4><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Even with the right security controls in place, the human element can render these systems useless, exposing organisations to many forms of cyberattacks. People, not technology, are the most common entry points for many cyberattacks. When employees are aware of security threats, what they look like, and what procedures to follow once identified, you\u2019re strengthening one of the weakest links in your security chain.<\/p><h4 style=\"font-family: Roboto, Roboto; font-weight: 400; line-height: 1.1; color: #c10d2e; margin-top: 30px; margin-bottom: 10px; font-size: 18px;\"><span style=\"font-weight: bold;\"><span style=\"color: #2980b9;\">The Right Training Program<\/span><\/span><\/h4><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Training programs need to accurately track employees\u2019 completion of various training modules to ensure compliance and effectiveness. Monitoring training activity allows you to see which team members need extra training to strengthen your weakest links. Security is everyone\u2019s responsibility. Awareness training makes everyone accountable for their actions, creating a shared sense of responsibility company wide.<\/p><h4 style=\"font-family: Roboto, Roboto; font-weight: 400; line-height: 1.1; color: #333333; margin-bottom: 10px; font-size: 18px;\"><span style=\"font-weight: bold;\"><span style=\"color: #2980b9;\">Comprehensive Cybersecurity Awareness Training Program<\/span><\/span><\/h4><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Cybersecurity awareness is not a one-off event. A comprehensive training program must be developed to ensure all staff understand and apply the necessary behaviours and skills to keep your organisation secure. An effective program includes staff induction training as well as continuous and engaging communications, with staff reminded of their responsibilities and updated with new developments.<\/p><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">Cybersecurity training programs need to accurately track employees\u2019 completion of various training modules to ensure compliance and effectiveness. Monitoring training activity allows you to see which team members need extra training to strengthen your weakest links. Security is everyone\u2019s responsibility. Cybersecurity awareness training makes everyone accountable for their actions, creating a shared sense of responsibility company wide.<\/p><h4 style=\"font-family: Roboto, Roboto; font-weight: 400; line-height: 1.1; color: #c10d2e; margin-top: 30px; margin-bottom: 10px; font-size: 18px;\"><span style=\"font-weight: bold;\"><span style=\"color: #2980b9;\">Staff are Critical<\/span><\/span><\/h4><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto; margin-bottom: 1.3rem !important;\">People are your most valuable assets and the highest operating expense for most organisations. With such a significant investment in your team, it\u2019s critical to ensure they\u2019re doing their job in an effective, safe and compliant manner. Staff are on the front line not only to your customers, suppliers and partners but also the first point of call for cybercriminals looking to exploit weaknesses and gain access to sensitive information.<\/p><h4 style=\"font-family: Roboto, Roboto; font-weight: 400; line-height: 1.1; color: #c10d2e; margin-top: 30px; margin-bottom: 10px; font-size: 18px;\"><span style=\"font-weight: bold;\"><span style=\"color: #2980b9;\">Conclusion<\/span><\/span><\/h4><p style=\"line-height: 1.4; color: #000000; font-family: Roboto, Roboto;\">Cyberattacks are no longer a case of \u201cif I get attacked\u201d but a matter of \u201cwhen I get attacked\u201d. Give your organisation the chance to avoid an incident. A single employee who knows how to recognise a threat could be the difference between staying secure and a crippling breach. Ultimately, when it comes to cybersecurity awareness training for employees, the only question to be asked is \u2018\u2019Are you doing enough?\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4838e80 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4838e80\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cybersec.co.th\/en\/contacts\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>",
        "protected": false
    },
    "excerpt": {
        "rendered": "<p>Cybersecurity Awareness Training Cyberattacks don\u2019t differentiate between organisation industry, type or size. Everyone is a target and vulnerable to attacks like phishing, social engineering and ransomware, and we\u2019re all only as strong as our weakest link. How would your organisation be impacted if your sensitive data was lost or stolen or your systems shut down, [&hellip;]<\/p>",
        "protected": false
    },
    "author": 2,
    "featured_media": 0,
    "parent": 0,
    "menu_order": 0,
    "comment_status": "closed",
    "ping_status": "closed",
    "template": "",
    "meta": {
        "footnotes": ""
    },
    "class_list": [
        "post-4579",
        "page",
        "type-page",
        "status-publish",
        "hentry"
    ],
    "_links": {
        "self": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/4579",
                "targetHints": {
                    "allow": [
                        "GET"
                    ]
                }
            }
        ],
        "collection": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages"
            }
        ],
        "about": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/types\/page"
            }
        ],
        "author": [
            {
                "embeddable": true,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/users\/2"
            }
        ],
        "replies": [
            {
                "embeddable": true,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/comments?post=4579"
            }
        ],
        "version-history": [
            {
                "count": 7,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/4579\/revisions"
            }
        ],
        "predecessor-version": [
            {
                "id": 4588,
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/pages\/4579\/revisions\/4588"
            }
        ],
        "wp:attachment": [
            {
                "href": "https:\/\/cybersec.co.th\/en\/wp-json\/wp\/v2\/media?parent=4579"
            }
        ],
        "curies": [
            {
                "name": "wp",
                "href": "https:\/\/api.w.org\/{rel}",
                "templated": true
            }
        ]
    }
}