---
description: This article explores a study of over 1,000 employees in India to find out how cyberattacks have affected businesses and the importance of cyber training.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Cyber training is key to employee cybersecurity engagement
---

# Employees rank cyber training as the best way to boost engagement with cybersecurity efforts

Canonical: https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement

Published on 31/1/2024 | Written by Sukanya Awasthi.

![Employees rank cyber training as the best way to boost engagement with cybersecurity efforts](https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png)

> Cybersecurity remains a high priority for businesses in India, but is that message getting through to employees? We asked over 1,200 of them to find out.

-----

## Article Content

Cybersecurity remains a high priority for businesses in India, but is that message getting through to employees? We asked over 1,200 of them to find out.In this articleMost employees see cybersecurity training as key to engagement79% of businesses have been targets of phishing attacks in the last 12 monthsConfidence in employers’ security measures is high84% of companies have protocols for employees to report attacksHow can businesses in India engage employees in cybersecurity?Our research has revealed that 61% of businesses in India suffered a data breach in the past 12 months. Unsurprisingly, we also discovered that 82% of companies have increased their investment in cybersecurity.But protecting against cyber threats is as much about people as it is about technology. In this article, we continue to explore data from our survey of 1,264 employees in India to find out how their organisation engages them in cybersecurity. We also dive deeper into phishing attacks and their consequences, as well as the security awareness training that businesses provide to their workforce.You can scroll down to the bottom of this article for a full methodology.Most employees see cybersecurity training as key to engagementGiven that today’s cyberattacks often enter an organisation via an unsuspecting employee, it is vital that businesses provide their people with the skills, technology, and support to be the first line of defence.This involves open conversations about cybersecurity between employer and employee, so that staff feel fully involved in the process. Overall, employees said that they would like to see a range of activities to help in this engagement, with training, interactive workshops, and phishing simulations all ranking highly.The desire for more training doesn’t mean that employees don’t already receive it, however. 97% said their company provides some kind of cybersecurity or data protection training. This was most commonly around data privacy (76%), general cybersecurity (71%), or social engineering (48%).Security awareness training is an ongoing exercise. 60% said they have refreshers every six months, and another 27% said they do training once a year. This reflects the fact that cybersecurity is constantly changing. Attackers are coming up with new threats all the time, and business practices (such as working from home) present new challenges to companies, which employees need to be aware of.Because so many employees undergo cybersecurity training (and fairly frequently, too), employees themselves feel confident in their understanding of the cybersecurity landscape. 88% said they have a good or very good awareness of cybersecurity risks and best practices within their company.Key takeaway: Businesses represented by the people in our survey clearly understand the value of regular cybersecurity training, and employees feel confident in the knowledge they have gained from this. However, there is a clear appetite for more, particularly in the form of interactive workshops.Sessions where staff can experience solutions first-hand and talk to experts about the best way to protect their identities and data could be a good way to strengthen employee awareness and a company’s defences.79% of businesses have been targets of phishing attacks in the last 12 monthsCriminals use phishing attacks to trick employees into handing over sensitive data. They send messages (often by email, but they can also be via social media or text message) that appear to be from a legitimate source, like a supplier or a bank. The messages may contain an attachment, which instals malicious software onto a target’s computer, or a link to a page where employees are asked to enter confidential information like passwords or bank details.These attacks are very common. Among the people we surveyed, 79% said that they or someone in their company had received a phishing email in the past 12 months. And 76% of those said that they (or someone else in the company) clicked on a link within one of those messages.Phishing attacks can be particularly problematic for businesses when employees’ accounts are compromised. If a hacker gains access to usernames and passwords, they can access the same files, systems, and confidential data that their victim can. And this isn’t a rare occurrence. 43% of the employees in our survey said they have experienced an account takeover in the past 12 months (where someone used a stolen username and password to access any type of online account).The risks related to an attacker taking over an account become higher if there is more data available to them. And many employees overall report that they have access to more data than they need. Around one-fifth (21%) said employees in their company have access to all company data, and 38% said employees have access to more data than is strictly necessary to perform their job.While the prevalence and potential risks of a phishing attack remain fairly high, companies are taking action. A majority (67%) of respondents said that their employer has carried out phishing tests in the past. These involve sending out safe emails that look like phishing attempts, and seeing how many employees are taken in.Key takeaways:If companies restrict employees’ access to data, they also reduce the potential damage if that employee’s account is compromised. Privileged access management software lets businesses establish access levels for people, devices, and systems.Phishing tests can serve as useful education tools because they let employers know what proportion of the workforce is equipped to recognise and stop the threat (and report it if necessary). They also help employees stay vigilant against these attacks by regularly putting their skills of detection to the test. Plus, 53% of employees think it’s a good way for their company to better engage them in cyber efforts.Confidence in employers’ security measures is highDespite the high number of data breaches, phishing attacks, and ransomware attacks, employees in our survey felt that their employers are on the right track. The majority (64%) were very confident that their company is taking cybersecurity seriously, and another 26% were quite confident.This may stem from the fact that communication between employers and employees on these matters seems to be open and productive. Most employees (79% overall) said they have raised cybersecurity concerns with their company’s IT department, to which the companies responded in a variety of positive ways.The usual outcomes of reporting a cybersecurity concern were further open communication between the IT department and employees, transparency about cybersecurity incidents and the measures taken to prevent them, and reminders for employees about best practices. Nevertheless, while using company devices, most employees (75%) said they take additional steps to protect their online safety that go above the company’s standard practices. Employers can either see this as confirmation that their own protections are insufficient or an endorsement of the fact that their staff are so well trained that they actively seek greater protection when using IT systems.84% of companies have protocols for employees to report attacksA majority of businesses view employees as a key way to identify and flag attacks. While it’s true that many cybersecurity software products can do this, attackers can slip through the net and remain undetected on networks for months. But if an employee spots unusual activity, or accidentally clicks a link that leads to a breach (and reports it), security experts can act quickly to shut down the attack.The vast majority (84%) of employees in our survey said that their company has protocols in place to report an attack. And 81% said there is a formal incident response plan in place.And as a final line of protection, many companies may choose to take out cyber insurance. These policies can often cover the cost of identifying and recovering from an attack, ransom payments, damages incurred through business closure, reputational damage, and potential costs to third parties. A majority (77%) of the respondents who are responsible for, involved in, or fully aware of company cybersecurity measures said that their firm has taken one of these policies out.Key takeaway: A channel for employees to report cyber incidents and an action plan to respond when they do are must-haves for businesses. Some cybersecurity tools (notably endpoint detection and response and identity threat protection and response software) specifically include features to mitigate damage if a breach occurs, and these actions can form part of a comprehensive response plan.How can businesses in India engage employees in cybersecurity?Our research has shown that employees in India are well trained on cybersecurity matters, are encouraged to participate in initiatives, and have confidence in their company’s approach.However, the number of attacks remains high, and many simple practices (good password hygiene, restricting access to data) could be more widely adopted. And employees themselves would also like more training on cybersecurity.By continuing to train staff about cybersecurity risks and controls —using a range of methods— companies can ensure that they’re well placed to protect their people and data against threats.Looking for security awareness training software? Check out our catalogue.

## Disclaimer

> Methodology:The data for Capterra’s 2024 Data Security Survey was collected between November 10th and 26th 2023 and comprises answers from 1264 respondents. We selected our survey sample based on the following criteria:India residentAged between 18-65 years-oldFull-time employeeWorks for a company which uses cybersecurity software tools for protection and has some awareness of which tools are used

## About the author

### Sukanya Awasthi

Sukanya Awasthi is a content analyst for Capterra, covering emerging technology trends with a focus on retail, construction and ERP. With an educational background in Computer Science, she brings 8 years of hands-on experience to her writing, translating intricate technical concepts into accessible and informative insights. &#10;&#10;Sukanya’s research and analysis is informed by nearly 200,000 authentic user reviews on Capterra and over 40,000 interactions between Capterra software advisors and software buyers. Sukanya also regularly analyzes market sentiment by conducting surveys of business leaders in the construction space, as well as retail leaders and consumers, so she can provide the most up-to-date and helpful information to small and midsize businesses purchasing software or services. &#10;&#10;Her work has been featured in Financial Express, Economic Times, and Bloomberg Quint, among other publications. Outside of work, she likes to spend time with her loved ones and her two dogs.

## Related Categories

- [Accounting Software](https://www.capterra.in/directory/1/accounting/software)
- [Compliance Regulatory Software](https://www.capterra.in/directory/30110/compliance/software)
- [CRM Software](https://www.capterra.in/directory/2/customer-relationship-management/software)
- [Network Security Software](https://www.capterra.in/directory/30003/network-security/software)
- [Project Management Software](https://www.capterra.in/directory/30002/project-management/software)

## Related Articles

- [Capterra Software Buyers Guides Methodology](https://www.capterra.in/blog/7590/buyers-guide-methodologies-in)
- [4 best ERP software in India for SMEs](https://www.capterra.in/blog/4386/best-erp-software-india)
- [5 types of branding strategies for Indian SMEs to boost their business impact](https://www.capterra.in/blog/4156/branding-strategies-for-indian-smes)
- [89% of Indian software buyers expect to spend at least 5% more on software in 2025](https://www.capterra.in/blog/7604/india-software-spending-rise-tech-trends)
- [Capterra’s Best Product Lists Methodologies](https://www.capterra.in/blog/7626/best-product-lists-methodologies-india)

## Links

- [View on Capterra](https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement)
- [Blog](https://www.capterra.in/blog)
- [Home](https://www.capterra.in/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra India","address":{"@type":"PostalAddress","addressLocality":"Mumbai","addressRegion":"MH","postalCode":"400051","streetAddress":"Gartner India Research & Advisory Services Pvt. Ltd. Raheja Towers 2nd Floor C-30 G- Block Bandra East Mumbai 400051 India"},"description":"Capterra India helps businesses find the best software. With verified reviews, prices & features, our interactive tool makes software selection fast & easy.","email":"info.india@gartner.com","url":"https://www.capterra.in/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.in/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/@CapterraIndia"]},{"name":"Capterra India","url":"https://www.capterra.in/","@type":"WebSite","@id":"https://www.capterra.in/#website","publisher":{"@id":"https://www.capterra.in/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.in/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Cyber training is key to employee cybersecurity engagement","description":"This article explores a study of over 1,000 employees in India to find out how cyberattacks have affected businesses and the importance of cyber training.","url":"https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement","about":{"@id":"https://www.capterra.in/#organization"},"@type":"WebPage","@id":"https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement#webpage","isPartOf":{"@id":"https://www.capterra.in/#website"}},{"description":"Cybersecurity remains a high priority for businesses in India, but is that message getting through to employees? We asked over 1,200 of them to find out.","author":[{"name":"Sukanya Awasthi","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png","@type":"ImageObject","@id":"https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement#primaryimage"},"@type":"BlogPosting","articleBody":"&lt;p&gt;&lt;b&gt;Cybersecurity remains a high priority for businesses in India, but is that message getting through to employees? We asked over 1,200 of them to find out.&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;Cyber-training-IN-Capterra-header&quot; alt=&quot;Cybersecurity report in India Capterra 2024&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/5EEujpB8NKacLkaLs1YfpG/4975e5b315edb412564df9c27a1d5e5a/Cyber-training-IN-Capterra-header.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;In this article&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Most-employees-see-cybersecurity-training-as-key-to-engagement&quot;&gt;Most employees see cybersecurity training as key to engagement&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#79-of-businesses-have-been-targets-of-phishing-attacks-in-the-last-12-months&quot;&gt;79% of businesses have been targets of phishing attacks in the last 12 months&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Confidence-in-employers-security-measures-is-high&quot;&gt;Confidence in employers’ security measures is high&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#84-of-companies-have-protocols-for-employees-to-report-attacks&quot;&gt;84% of companies have protocols for employees to report attacks&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#How-can-businesses-in-India-engage-employees-in-cybersecurity&quot;&gt;How can businesses in India engage employees in cybersecurity?&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;Our research has revealed that &lt;a href=&quot;/blog/4423/what-indian-businesses-can-do-to-reduce-the-risk-of-cyberthreats-in-2024&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;61% of businesses in India suffered a data breach in the past 12 months&lt;/a&gt;. Unsurprisingly, we also discovered that 82% of companies have increased their investment in cybersecurity.&lt;/p&gt;&lt;p&gt;But protecting against cyber threats is as much about people as it is about technology. In this article, we continue to explore data from our survey of 1,264 employees in India to find out how their organisation engages them in cybersecurity. We also dive deeper into phishing attacks and their consequences, as well as the &lt;a href=&quot;/directory/33095/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;security awareness training&lt;/a&gt; that businesses provide to their workforce.&lt;/p&gt;&lt;p&gt;You can scroll down to the bottom of this article for a full methodology.&lt;/p&gt;&lt;h2 id=&quot;Most-employees-see-cybersecurity-training-as-key-to-engagement&quot;&gt;Most employees see cybersecurity training as key to engagement&lt;/h2&gt;&lt;p&gt;Given that today’s cyberattacks often enter an organisation via an unsuspecting employee, it is vital that businesses provide their people with the skills, technology, and support to be the first line of defence.&lt;/p&gt;&lt;p&gt;This involves open conversations about cybersecurity between employer and employee, so that staff feel fully involved in the process. Overall, employees said that they would like to see a range of activities to help in this engagement, with training, interactive workshops, and phishing simulations all ranking highly.&lt;/p&gt;&lt;img title=&quot;CA-IN-DataSec-pt2-graph 1&quot; alt=&quot;How to engage employees in cybersecurity efforts&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/6VJZvSB3wsDGAS85HE19rZ/80e585eb915a0b849523349781dee04c/CA-IN-DataSec-pt2-graph_1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;The desire for more training doesn’t mean that employees don’t already receive it, however. 97% said their company provides some kind of cybersecurity or data protection training. This was most commonly around data privacy (76%), general cybersecurity (71%), or social engineering (48%).&lt;/p&gt;&lt;img title=&quot;CA-IN-DataSec-pt2-graph2&quot; alt=&quot;Different types of cybersecurity training which companies provide&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/4K14NS2k127FOrGsRADOFb/0381c31529e3cacc647ecd8fd5733537/CA-IN-DataSec-pt2-graph2.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Security awareness training is an ongoing exercise. 60% said they have refreshers every six months, and another 27% said they do training once a year. This reflects the fact that cybersecurity is constantly changing. Attackers are coming up with new threats all the time, and business practices (such as working from home) present new challenges to companies, which employees need to be aware of.&lt;/p&gt;&lt;p&gt;Because so many employees undergo cybersecurity training (and fairly frequently, too), employees themselves feel confident in their understanding of the cybersecurity landscape. 88% said they have a good or very good awareness of cybersecurity risks and best practices within their company.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;p&gt;&lt;b&gt;Key takeaway: &lt;/b&gt;Businesses represented by the people in our survey clearly understand the value of regular &lt;a href=&quot;/directory/33095/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity training&lt;/a&gt;, and employees feel confident in the knowledge they have gained from this. However, there is a clear appetite for more, particularly in the form of interactive workshops.&lt;/p&gt;&lt;p&gt;Sessions where staff can experience solutions first-hand and talk to experts about the best way to protect their identities and data could be a good way to strengthen employee awareness and a company’s defences.&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;79-of-businesses-have-been-targets-of-phishing-attacks-in-the-last-12-months&quot;&gt;79% of businesses have been targets of phishing attacks in the last 12 months&lt;/h2&gt;&lt;p&gt;Criminals use phishing attacks to trick employees into handing over sensitive data. They send messages (often by email, but they can also be via social media or text message) that appear to be from a legitimate source, like a supplier or a bank. The messages may contain an attachment, which instals malicious software onto a target’s computer, or a link to a page where employees are asked to enter confidential information like passwords or bank details.&lt;/p&gt;&lt;p&gt;These attacks are very common. Among the people we surveyed, 79% said that they or someone in their company had received a phishing email in the past 12 months. And 76% of those said that they (or someone else in the company) clicked on a link within one of those messages.&lt;/p&gt;&lt;p&gt;Phishing attacks can be particularly problematic for businesses when employees’ accounts are compromised. If a hacker gains access to usernames and passwords, they can access the same files, systems, and confidential data that their victim can. And this isn’t a rare occurrence. 43% of the employees in our survey said they have experienced an account takeover in the past 12 months (where someone used a stolen username and password to access any type of online account).&lt;/p&gt;&lt;p&gt;The risks related to an attacker taking over an account become higher if there is more data available to them. And many employees overall report that they have access to more data than they need. Around one-fifth (21%) said employees in their company have access to all company data, and 38% said employees have access to more data than is strictly necessary to perform their job.&lt;/p&gt;&lt;img title=&quot;CA-IN-DataSec-pt2-graph3&quot; alt=&quot;Levels of data access which employees have&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/4Gw2Wcz1WDRKQWd9nLj3Wl/a31b2bdb8c41a48d6785781ab3f20a8c/CA-IN-DataSec-pt2-graph3.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;While the prevalence and potential risks of a phishing attack remain fairly high, companies are taking action. A majority (67%) of respondents said that their employer has carried out phishing tests in the past. These involve sending out safe emails that look like phishing attempts, and seeing how many employees are taken in.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 18 18&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-check-circle box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M9 0C4 0 0 4 0 9C0 14 4 18 9 18C14 18 18 14 18 9C18 4 14 0 9 0ZM14.8 6.7L7.9 14.7C7.7 14.9 7.4 15 7.1 15C6.8 15 6.5 14.9 6.3 14.7L3.2 11C2.9 10.6 2.9 10 3.3 9.6C3.7 9.2 4.4 9.3 4.7 9.7L7.1 12.5L13.2 5.4C13.6 5 14.2 4.9 14.6 5.3C15.1 5.6 15.1 6.2 14.8 6.7Z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Key takeaways:&lt;/div&gt;&lt;ol&gt;&lt;li&gt;If companies restrict employees’ access to data, they also reduce the potential damage if that employee’s account is compromised. &lt;a href=&quot;/directory/31238/privileged-access-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Privileged access management software&lt;/a&gt; lets businesses establish access levels for people, devices, and systems.&lt;/li&gt;&lt;li&gt;Phishing tests can serve as useful education tools because they let employers know what proportion of the workforce is equipped to recognise and stop the threat (and report it if necessary). They also help employees stay vigilant against these attacks by regularly putting their skills of detection to the test. Plus, 53% of employees think it’s a good way for their company to better engage them in cyber efforts.&lt;/li&gt;&lt;/ol&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;h2 id=&quot;Confidence-in-employers-security-measures-is-high&quot;&gt;Confidence in employers’ security measures is high&lt;/h2&gt;&lt;p&gt;Despite the high number of data breaches, phishing attacks, and &lt;a href=&quot;/blog/4423/what-indian-businesses-can-do-to-reduce-the-risk-of-cyberthreats-in-2024&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;ransomware attacks&lt;/a&gt;, employees in our survey felt that their employers are on the right track. The majority (64%) were very confident that their company is taking cybersecurity seriously, and another 26% were quite confident.&lt;/p&gt;&lt;p&gt;This may stem from the fact that communication between employers and employees on these matters seems to be open and productive. Most employees (79% overall) said they have raised cybersecurity concerns with their company’s IT department, to which the companies responded in a variety of positive ways.&lt;/p&gt;&lt;img title=&quot;CA-IN-DataSec-pt2-graph4&quot; alt=&quot;Different company responses to employees raising cybersecurity concerns&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/3YLcNO9jW8bRIcm4qYpuTn/2445ad777dead129224a6c71ecaa52b7/CA-IN-DataSec-pt2-graph4.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;The usual outcomes of reporting a cybersecurity concern were further open communication between the IT department and employees, transparency about cybersecurity incidents and the measures taken to prevent them, and reminders for employees about best practices. &lt;/p&gt;&lt;p&gt;Nevertheless, while using company devices, most employees (75%) said they take additional steps to protect their online safety that go above the company’s standard practices. Employers can either see this as confirmation that their own protections are insufficient or an endorsement of the fact that their staff are so well trained that they actively seek greater protection when using IT systems.&lt;/p&gt;&lt;h2 id=&quot;84-of-companies-have-protocols-for-employees-to-report-attacks&quot;&gt;84% of companies have protocols for employees to report attacks&lt;/h2&gt;&lt;p&gt;A majority of businesses view employees as a key way to identify and flag attacks. While it’s true that many &lt;a href=&quot;/directory/10005/computer-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt; products can do this, attackers can slip through the net and remain undetected on networks for months. But if an employee spots unusual activity, or accidentally clicks a link that leads to a breach (and reports it), security experts can act quickly to shut down the attack.&lt;/p&gt;&lt;p&gt;The vast majority (84%) of employees in our survey said that their company has protocols in place to report an attack. And 81% said there is a formal incident response plan in place.&lt;/p&gt;&lt;img title=&quot;CA-IN-DataSec-pt2-graph5&quot; alt=&quot;Do companies have protocols for reporting cybersecurity breaches or an incident response plan?&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/3yMbBTNHOO2m4ERKtakcpB/b3d84f88d05c9202da11ddbb51973129/CA-IN-DataSec-pt2-graph5.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;And as a final line of protection, many companies may choose to take out cyber insurance. These policies can often cover the cost of identifying and recovering from an attack, ransom payments, damages incurred through business closure, reputational damage, and potential costs to third parties. A majority (77%) of the respondents who are responsible for, involved in, or fully aware of company cybersecurity measures said that their firm has taken one of these policies out.&lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;b&gt;Key takeaway: &lt;/b&gt;A channel for employees to report cyber incidents and an action plan to respond when they do are must-haves for businesses. Some cybersecurity tools (notably &lt;a href=&quot;/directory/31695/endpoint-detection-and-response/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;endpoint detection and response&lt;/a&gt; and &lt;a href=&quot;/directory/33835/identity-threat-detection-and-response-%28itdr%29/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;identity threat protection and response&lt;/a&gt; software) specifically include features to mitigate damage if a breach occurs, and these actions can form part of a comprehensive response plan.&lt;/div&gt;&lt;h2 id=&quot;How-can-businesses-in-India-engage-employees-in-cybersecurity&quot;&gt;How can businesses in India engage employees in cybersecurity?&lt;/h2&gt;&lt;p&gt;Our research has shown that employees in India are well trained on cybersecurity matters, are encouraged to participate in initiatives, and have confidence in their company’s approach.&lt;/p&gt;&lt;p&gt;However, the number of attacks remains high, and many simple practices (good password hygiene, restricting access to data) could be more widely adopted. And employees themselves would also like more training on cybersecurity.&lt;/p&gt;&lt;p&gt;By continuing to train staff about cybersecurity risks and controls —using a range of methods— companies can ensure that they’re well placed to protect their people and data against threats.&lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Looking for &lt;a href=&quot;/directory/33095/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;evnt&quot; data-evac=&quot;ua_click&quot; data-evca=&quot;Blog_idea&quot; data-evna=&quot;engagement_blog_product_category_click&quot; target=&quot;_blank&quot;&gt;security awareness training software&lt;/a&gt;? Check out our catalogue.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2024-01-31T03:30:03.000000Z","datePublished":"2024-01-31T00:00:00.000000Z","headline":"Employees rank cyber training as the best way to boost engagement with cybersecurity efforts","inLanguage":"en-IN","mainEntityOfPage":"https://www.capterra.in/blog/4503/cyber-training-cybersecurity-engagement#webpage","publisher":{"@id":"https://www.capterra.in/#organization"}}]}
</script>
