{"id":1686,"date":"2021-07-06T16:16:44","date_gmt":"2021-07-06T10:46:44","guid":{"rendered":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/?p=1686"},"modified":"2024-11-06T16:39:10","modified_gmt":"2024-11-06T11:09:10","slug":"cybersecurity-training","status":"publish","type":"post","link":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/","title":{"rendered":"Why Cybersecurity Training for the Workforce is More Important Than Ever"},"content":{"rendered":"\n<p>Cybersecurity training or information security training, aka infosec training, might not be a favorite topic of discussion among your L&amp;D team members. But you can face serious consequences if you do not give enough importance to making your employees aware of cybersecurity issues. Why? <\/p>\n\n\n\n<p><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Knowledge of cybersecurity and information technology is inevitable since it serves as the backbone for preventing a cyber breach or attack<\/a>. After all, one cannot report a security breach when one does not recognise it. And one of the significant reasons for cyber threats is human errors. So, now, let us understand in detail why an efficient cybersecurity training or infosec training program is necessary.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_75 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69de66611b55f\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69de66611b55f\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#Why_Cybersecurity_Training_for_the_Workforce_is_More_Important_Than_Ever\" >Why Cybersecurity Training for the Workforce is More Important Than Ever?<\/a><ul class='ez-toc-list-level-6' ><li class='ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#Identification_of_Cyber_Threats\" >Identification of Cyber Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#Cybersecurity_Awareness\" >Cybersecurity Awareness<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#What_Should_Be_Your_Cybersecurity_Training_Game_Plan\" >What Should Be Your Cybersecurity Training Game Plan?<\/a><ul class='ez-toc-list-level-6' ><li class='ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#The_Basic_Framework_of_Cybersecurity_Training\" >The Basic Framework of Cybersecurity Training<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-6'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#Engagement_During_Cybersecurity_Training\" >Engagement During Cybersecurity Training<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h5 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Why_Cybersecurity_Training_for_the_Workforce_is_More_Important_Than_Ever\"><\/span>Why Cybersecurity Training for the Workforce is More Important Than Ever?<span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"437\" src=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture1-1024x437.jpg\" alt=\"cybersecurity training\" class=\"wp-image-1691\" title=\"\" srcset=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture1-1024x437.jpg 1024w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture1-300x128.jpg 300w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture1-768x327.jpg 768w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture1.jpg 1466w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Cybersecurity training offers a gamut of benefits:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"633\" src=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-1024x633.png\" alt=\"\" class=\"wp-image-3772\" title=\"\" srcset=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-1024x633.png 1024w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-300x186.png 300w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-768x475.png 768w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-465x288.png 465w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28-695x430.png 695w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2022\/09\/image-28.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Source: <a href=\"https:\/\/www.idagent.com\/blog\/10-facts-about-the-benefits-of-security-awareness-training\/#:~:text=Security%2Drelated%20risks%20are%20reduced,invest%20in%20cybersecurity%20awareness%20training.&amp;text=Trained%20users%20are%2030%25%20less,detect%20and%20respond%20to%20cyberthreats.\" target=\"_blank\" rel=\"noopener\">idagent.com<\/a><\/figcaption><\/figure>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Identification_of_Cyber_Threats\"><\/span>Identification of Cyber Threats<span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p>Cybersecurity threats come in various types, clad in multiple disguises and ready to go! A cyber threat must be identified, reported, and addressed. If you see something, you need to report it instantly. Cybersecurity seems like common knowledge, but human error accounts for a huge chunk of successful cyber-attacks. <\/p>\n\n\n\n<p>With that information, managers should keep in mind that hackers don\u2019t just enter via the IT department. They go after vulnerabilities. That\u2019s why infosec training to demonstrate cybersecurity skills and understanding are the responsibility of every role in the company.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cybersecurity_Awareness\"><\/span>Cybersecurity Awareness<span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p>When employers make cybersecurity or infosec training a priority, they are helping to prevent significant losses within a company. However, awareness training rarely addresses the skill and application of that knowledge. Changing risky employee behavior will help quell a cyber-attack and is critical for businesses to understand. <\/p>\n\n\n\n<p>It\u2019s not enough to be knowledgeable about security but to implement a career-long training strategy that will help to eradicate cybercrime. There are constantly new threats to cyber safety, so ongoing training is essential and should be a part of the overall infosec training process from the very beginning.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Should_Be_Your_Cybersecurity_Training_Game_Plan\"><\/span>What Should Be Your Cybersecurity Training Game Plan?<span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture2-1024x575.png\" alt=\"infosec training\" class=\"wp-image-1692\" title=\"\" srcset=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture2-1024x575.png 1024w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture2-300x169.png 300w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture2-768x432.png 768w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture2.png 1484w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Some think small businesses can avoid significant hacks and breaches, but that is untrue. Since human error is the biggest problem we face, that means that everyone is at risk. <\/p>\n\n\n\n<p>To drive home the point on the urgency of cybersecurity, you must keep the employees abreast of all the latest data: a weekly bulletin highlighting what\u2019s new in cybersecurity and safety is an effective measure in spreading awareness and targeting what they need to do.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_Basic_Framework_of_Cybersecurity_Training\"><\/span>The Basic Framework of Cybersecurity Training<span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p>All training programs are unique, but the most significant difference is their efficacy and implementation in the workplace. A business should focus on cybersecurity training or infosec training in general and the right cybersecurity dangers to look for, such as insider threats, ransomware, etc. <\/p>\n\n\n\n<p>This type of infosec training should be mandatory for all employees at every level. Essentially anyone using a computer should know how to identify phishing schemes and social engineering attacks. These things may go overlooked and create severe problems if they are not easily identifiable.<\/p>\n\n\n\n<p>These attacks can happen via email or telephone, so that\u2019s a base you should cover. Cover secure browsing practices during training. All employees should be able to identify and avoid suspicious links and evade hacking attempts since phishing attempts are on the rise. <\/p>\n\n\n\n<p>In the case of remote work (which has been rising for months due to the COVID-19 pandemic), you should acknowledge the dangers of public Wi-Fi. Cover the possibility of leaked passwords or other data and how to prevent the same in your infosec training.<\/p>\n\n\n\n<p>So let\u2019s focus on what employees should know and what they should do. For the training to be practical, \u201clive fire\u201d practice attacks should be conducted to enable employees to handle this type of breach. <\/p>\n\n\n\n<p>A live-fire exercise in an infosec training session simulates the real thing. Like a fire drill, this implementation will mimic a true-to-life scenario and help prepare employees to behave and react when an actual cyber-attack occurs.<\/p>\n\n\n<div class=\"wp-block-image is-style-top-wave\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture3-1024x682.png\" alt=\"\" class=\"wp-image-1693\" title=\"\" srcset=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture3-1024x682.png 1024w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture3-300x200.png 300w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture3-768x512.png 768w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture3.png 1426w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Here is a suggested list of topics you will need to cover for comprehensive Cybersecurity Training or Infosec Training for your workplace:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Security\n<ul class=\"wp-block-list\">\n<li>What should not be shared online<\/li>\n\n\n\n<li>Identity theft<\/li>\n\n\n\n<li>Protect yourself &amp; your employer against identity theft<\/li>\n\n\n\n<li>Authentication and passwords<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Internet Security\n<ul class=\"wp-block-list\">\n<li>Configuring web-browser security settings<\/li>\n\n\n\n<li>Secure Backups<\/li>\n\n\n\n<li>Encrypting<\/li>\n\n\n\n<li>Sandboxing<\/li>\n\n\n\n<li>Scanning Viruses Using Online Tools<\/li>\n\n\n\n<li>Secure Online Shopping<\/li>\n\n\n\n<li>Securing your Emails<\/li>\n\n\n\n<li>Antiviruses<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Attacks\n<ul class=\"wp-block-list\">\n<li>DNS attacks<\/li>\n\n\n\n<li>HTTP attacks<\/li>\n\n\n\n<li>Cookie hijacking attacks<\/li>\n\n\n\n<li>Session hijacking attacks<\/li>\n\n\n\n<li>Intro to Malware, Ransomware and Spyware<\/li>\n\n\n\n<li>Understanding the S in HTTPS Access<\/li>\n\n\n\n<li>Recognizing Sophisticated Spear Phishing Scams<\/li>\n\n\n\n<li>Exploiting Human Psychology with Social Engineering<\/li>\n\n\n\n<li>Securing Desktop Apps that Access Social Networks<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Mobile security\n<ul class=\"wp-block-list\">\n<li>Understanding Mobile App Security<\/li>\n\n\n\n<li>Using Multi-factor Authentication<\/li>\n\n\n\n<li>Understanding the Dangers of Metadata<\/li>\n\n\n\n<li>Risks of Location-Based Social Networks<\/li>\n\n\n\n<li>How Hackers Use Geolocation Tracking Maliciously<\/li>\n\n\n\n<li>How to Safely Access Public Wi-Fi<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Mobile cybersecurity and hardware threats\n<ul class=\"wp-block-list\">\n<li>Hacked Chargers: The Latest Cybersecurity Risk<\/li>\n\n\n\n<li>Safely Disposing of Mobile Digital Storage Devices<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Cybersecurity and work from home<\/li>\n\n\n\n<li>Cybersecurity for BYOD<\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Engagement_During_Cybersecurity_Training\"><\/span>Engagement During Cybersecurity Training<span class=\"ez-toc-section-end\"><\/span><\/h6>\n\n\n\n<p>Like any other training, cybersecurity training or infosec training is only effective when employees are present and engaged for its duration. If you (and by extension, your employees) view cybersecurity training as a box, you tick once and forget, and it\u2019s as if you didn\u2019t deliver said training at all.<\/p>\n\n\n\n<p>Create (or buy) engaging courses: First and foremost: your infosec training courses should be engaging, not boring. <\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Read More: <a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/design-top-notch-elearning-content-by-overcoming-these-5-major-roadblocks\/\" class=\"rank-math-link\">Design Top-Notch Workplace Learning Content by Overcoming These 5 Major Roadblocks<\/a><\/h6>\n\n\n\n<p>Use more real-life examples: You should understand how to present complex subject matters, like password safety, in a way that makes sense and feels relevant to your employees\u2019 daily lives.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"764\" src=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture4-1024x764.jpg\" alt=\"\" class=\"wp-image-1694\" title=\"\" srcset=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture4-1024x764.jpg 1024w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture4-300x224.jpg 300w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture4-768x573.jpg 768w, https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-content\/uploads\/2021\/07\/Picture4.jpg 1350w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Avoid technical, confusing language: Even when your training covers complex issues like the GDPR, you can still make sure you\u2019re using a language that would be easily understandable by a 15-year-old. That way, employees won\u2019t feel alienated by the jargon.<\/p>\n\n\n\n<p>Offer <a class=\"rank-math-link\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/beat-the-forgetting-curve\/\">micro-learning sessions regularly<\/a>: Cybersecurity training or infosec training for employees should not happen once \u2014 and then promptly forgotten about. Microlearning is excellent for engagement and makes it possible for employees to study from their mobile phones.<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\"><em>Ad: PlayAblo&#8217;s Enterprise-Grade Micro-Learning platform is built for millennial learners. Micro-Learning, along with assessments and gamification features, ensures learning outcome measurement along with sustained engagement.<\/em><br><em><a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/connect\/\">Find out more and request a custom demo!<\/a><\/em><\/p>\n\n\n\n<p>Add <a class=\"rank-math-link\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/impact-of-gamification-in-corporate-learning\/\">gamification<\/a> elements to your infosec training. From fun quizzes to scoreboards and interactive features that use <a class=\"rank-math-link\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/what-is-social-learning-at-workplace\/\">social<\/a> and <a class=\"rank-math-link\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/informal-learning-at-workplace\/\">informal training<\/a>, gamification ensures that learners are more likely to stay focused till the end of the course. By involving fun elements \u2014 even if it\u2019s something as simple as a badge they can share with their coworkers.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Read More: <a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/impact-of-gamification-in-corporate-learning\/\" class=\"rank-math-link\">Impact of Gamification in Corporate Learning<\/a><\/h6>\n\n\n\n<p>Make sure you cover all learning styles: Some people learn better by reading; others by seeing, listening or doing. Animated, voice-over videos that include captions, combined with more practical, hands-on tasks, make it easier for all <a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/elearning-and-the-non-millennials\/\" class=\"rank-math-link\">different types of learners<\/a> to stay engaged during cybersecurity training.<\/p>\n\n\n\n<p>Create follow-up infosec training to reinforce learning: Even if your employees have retained the information from their training at first, they may slip back to their old, bad habits after a while. It would be best to evaluate employees frequently and always have follow-up training at hand for when people need a refresher.<\/p>\n\n\n\n<p>Use <a class=\"rank-math-link\" href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/e-certificates-for-courses-on-lms\/\">certificates<\/a> and prizes as incentives: Most people are results-driven. Offering a prize or a certificate once they complete their infosec training can work as an extra incentive for them to remain engaged throughout its duration.<\/p>\n\n\n\n<p>Cybersecurity training should be for humans, not machines: Just because it\u2019s about devices, it doesn\u2019t mean infosec training for employees should feel like it was created for machines.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n\n<p>If you deliver cybersecurity training or infosec training without making it engaging to real humans, you throw away more than just the money you spent on creating it. You also risk hurting your brand reputation and incurring everything from cyberattacks to compliance fines.<\/p>\n\n\n\n<p class=\"has-very-light-gray-background-color has-background\"><em>Ad: PlayAblo&#8217;s Enterprise-Grade Micro-Learning platform is built for millennial learners. Micro-Learning, along with assessments and gamification features, ensures learning outcome measurement along with sustained engagement.<\/em><br><em><a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/connect\/\">Find out more and request a custom demo!<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity training or information security training, aka infosec training, might not be a favorite topic of discussion among your L&amp;D team members. But you can face serious consequences if you do not give enough importance to making your employees aware of cybersecurity issues. Why? Knowledge of cybersecurity and information technology<span class=\"more-link\"><a href=\"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/cybersecurity-training\/\">Continue Reading<\/a><\/span><\/p>\n","protected":false},"author":4,"featured_media":1700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[],"tags":[],"class_list":["entry","author-anisha-d","post-1686","post","type-post","status-publish","format-standard","has-post-thumbnail"],"_links":{"self":[{"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/posts\/1686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/comments?post=1686"}],"version-history":[{"count":10,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/posts\/1686\/revisions"}],"predecessor-version":[{"id":5554,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/posts\/1686\/revisions\/5554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/media\/1700"}],"wp:attachment":[{"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/media?parent=1686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/categories?post=1686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.playablo.com\/CorporateLearning\/Blog\/wp-json\/wp\/v2\/tags?post=1686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}