{"id":144,"date":"2006-07-22T00:00:00","date_gmt":"2006-07-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/22\/the-value-of-branding-your-security-awareness-program\/"},"modified":"2021-12-30T11:36:36","modified_gmt":"2021-12-30T11:36:36","slug":"the-value-of-branding-your-security-awareness-program","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/07\/22\/the-value-of-branding-your-security-awareness-program\/","title":{"rendered":"The Value of Branding Your Security Awareness Program"},"content":{"rendered":"<p>Computing Technology Industry Association (CompTIA) released results of a study earlier this year that cites human error was responsible for nearly 60 percent of information security breaches experienced by organizations over the last year.  Additionally the results of the study show that most companies don&#8217;t require security awareness training and only 36% of companies surveyed offered end user security awareness training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While we have installed firewalls, intrusion detection systems, robust anti-virus and anti-spyware solutions, and strengthened authentication methods, we have still largely ignored security awareness training.  And when the authors say ignored, she means that most companies now have an Acceptable Use Policy in place that employees have to sign upon employment, but that&#8217;s where the effort stops.  Security awareness programs are about changing culture.<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/articles.php?art_id=157&#038;PHPSESSID=ccd23e68b1848b308c34fd9680492a63<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"predecessor-version":[{"id":2631,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/144\/revisions\/2631"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}