Do you despair that users will never learn to avoid stupid security mistakes that compromise your organization? Maybe you're not spending enough time and effort on training Credit: Thinkstock Two exploit vectors account for the vast majority of computer security risk inside most organizations: unpatched software and social engineering. If you don’t concentrate on these two areas, you’re wasting your time.Perfect patching may seem hard to do, but it’s a piece of cake compared to educating your users against social engineering. It takes only one idiot to infect a company.In fact, it’s so hard to train users not to do stupid things, many defenders simply assume it can’t be done. Maybe that explains why so few resources go into user education and why most companies’ education materials are horribly outdated.The fact that you’ll always have users who will click on anything doesn’t absolve you from trying to educate. In fact, current evidence shows you cannot be a successful defender without a top-notch user education program. When I talk about this to customers, most agree with me, although a few respond that their user education programs are good enough — yet you can hear doubt creep in as they think more about it.One of my favorite questions to ask is whether users have been trained to know what their antivirus program looks like when it actually finds malware. I ask this because one of the most common social engineering tricks is for malware writers to send users a fake antivirus detection warning, which encourages users to run fake antivirus software. How can we expect people to make the right decision if they don’t know what their legitimate antivirus program looks like? I then ask a whole series of questions about the education program:Are users told that most malware comes from “trusted” websites they visit all the time?Are they instructed never to install software they’re told is needed by websites they visit?Are they told not to run “documents” that end up trying to install things?Are they instructed to contact the IT security department if they think they’ve accidentally infected their computer and there will be no repercussions for doing so?Are they told over and over never to share passwords among multiple websites — and are they tested on it?Are they aware that APTs (advanced persistent threats) often create malicious emails that appear to originate from co-workers or senior management telling them to hurry up and open documents or run executables?Are they frequently tested to see if they respond to fake phishing emails?Any good user education program should cover all these topics and more. Employees should be tested and re-educated if they fail those tests.Training for hireOf course, you don’t have to roll your own education program. Dozens of companies out there have fully prepared, professional user education resources ready for easy deployment within your company.I’ve tried many of these programs over the years, and I think many of them would work great in any company. But I’ve probably spent more time with KnowBe4 than any other. You have to love a company that promises to pay the ransom if your users get infected with ransomware!KnowBe4 currently has more than 1,200 enterprise customers — and reformed uber-hacker Kevin Mitnick is the company’s “chief hacking officer.” KnowBe4 focuses on security awareness training, computer-based phish testing, and voice-based phishing (a newer method where companies call home users, claim to have detected malware, and offer to “clean up” the infection). Training can target enterprises or home users, with specific content for both. The videos, in nine languages, are all accessible over the Internet and have great production values.Session subjects cover passwords, spam, phishing, social networking, and smartphone security. The training is accurate and relevant. I found the password session exceptional, with great advice, including the use of long passwords (20 characters or more), passphrases, multifactor authentication, and more. KnowBe4 also has an email phishing test. Administrators can log on to an administrative console to add users and place them into groups for different phishing test campaigns, which offer administrators a selection of email templates to choose from. The test phish emails are well done and should fool a good amount of users the first time through. You can run a variety of reports using an admin console to see who has taken the various tests or lessons, as well as the current user status.Any manager or employee participating in KnowBe4 training would find it worth the money and time. If you want top-quality user education videos and are willing to pay a reasonable price — about $10 per user per year — KnowBe4 is a great choice.Whether you create your own user education materials or turn to a third party, good user training is essential. If what you have isn’t working, improve it. If it’s not perfect, strive for perfection. Do what it takes. If users actually internalize well-crafted training, you’ll come much, much closer to keeping the bad guys at bay. Related content analysis The 5 types of cyber attack you're most likely to face Don't be distracted by the exploit of the week. Invest your time and money defending against the threats you're apt to confront By Roger Grimes Aug 21, 2017 7 mins Phishing Malware Social Engineering analysis 'Jump boxes' and SAWs improve security, if you set them up right Organizations consistently and reliably using one or both of these approaches have far less risk than those that do not. By Roger Grimes Jul 26, 2017 13 mins Authentication Access Control Data and Information Security analysis Attention, 'red team' hackers: Stay on target You hire elite hackers to break your defenses and expose vulnerabilities -- not to be distracted by the pursuit of obscure flaws By Roger Grimes Dec 08, 2015 4 mins Hacking Data and Information Security Network Security analysis 4 do's and don'ts for safer holiday computing It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily By Roger Grimes Dec 01, 2015 4 mins Phishing Malware Patch Management Software Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe