e-Learning Blog

Blog

2024.04.26

Original Teaching Materials

Introducing common challenges and solutions for in-house information security education!

  • Category

  • Recommended Articles

  •  

    Moodle Implementation Support and Operation Services
    e-Learning Material Production Service

    In recent years, various damages have been reported such as targeted attacks and ransomware attacks targeting organizations and companies, as well as information security incidents caused by non-compliance with rules. Specifically, these include troubles such as accessing fraudulent websites, opening spoofed emails, and careless handling or loss of confidential data. In order to prevent these damages and accidents, it is necessary for all employees to have knowledge about information security.

    Therefore, many companies are focusing on information security education. However, there are cases where the efforts are insufficient or issues arise in education.
    That's why this time, we will explain common challenges and methods to solve them in information security education for employees. Additionally, we will introduce points to enhance the effectiveness of education.


    1. Background on the Importance of Information Security Education

    First, let's organize the background of why information security education is becoming increasingly important in companies.

    〈1. Increase in Cyber Attacks and Growing Threats〉

    The number of cyber attacks in Japan is increasing, and their methods are becoming more diverse and sophisticated. According to the Ministry of Internal Affairs and Communications' "Information and Communications White Paper (2022 edition)," the National Institute of Information and Communications Technology (NICT) observed approximately 522.6 billion packets of cyber attack-related communications in 2022 through its large-scale cyber attack observation network, which is 8.3 times higher than the number observed in 2015 (approximately 63.2 billion packets).

    (Figure) Transition of communication numbers related to cyber attacks at NICTER

    <2. Risk of significant economic loss>

    The white paper also summarizes the economic losses caused by cyber security troubles, based on investigations and analyses by various organizations. For example, let us introduce a survey conducted by Trend Micro. In Japan, the average annual damage per organization caused by security incidents in fiscal year 2021 was calculated to be approximately 328.5 million yen.

    (Illustration) Figure 4-10-2-3 Economic Losses Caused by Cybersecurity Issues



    Excerpt from "Economic Losses Caused by Cybersecurity Issues"

    〈3. Strict Legal Regulations〉

    In Japan, there has been a trend towards stricter legal requirements for information security, with the revised Personal Information Protection Act fully implemented in April 2022 as a representative example. Companies and organizations are required to update their knowledge on information security in order to comply with these laws.

    <4. Improvement of Corporate Value and Reliability>

    Companies that have established information security management systems are more likely to be trusted by customers and business partners. In other words, companies can enhance their credibility and corporate value through information security education.

    〈5. The Need to Respond to Evolving Threats〉

    As information security threats continue to evolve on a daily basis, employee education must be conducted regularly and based on the latest knowledge. Through education, we can cultivate personnel who can respond appropriately.

    As such, there are multiple factors behind the importance placed on information security education, all of which are crucial elements for the survival of a company.

    2. Common Challenges in Internal Information Security Education

    Important information security education, but when trying to implement it in the company, there are various challenges that may arise. Let's take a look at common issues that many companies face.

    <Task 1>Lack of concentration among participants

    There may be times when the concentration of participants is interrupted due to monotonous content, long lectures, or one-sided lecture formats. It is also possible that the lack of tension due to internal personnel serving as instructors may be a factor.

    〈Task 2〉The training content lacks realism.

    In particular, during classroom training, it can be difficult for participants to imagine real-life scenarios, and they may end up progressing through the learning without a sense of reality. As a result, there is a possibility that they may not be able to take the correct action when a problem occurs.

    <Task 3>Latest trends and information are not reflected

    In the field of information security, new attack methods and countermeasures are constantly being announced. Incorporating such up-to-date information into training materials can be a burden for companies that handle training internally, and it may take time to prepare and implement.

    <Task 4>Education Effect Not Felt

    If there is no opportunity for follow-up or review after training, there is a possibility that knowledge about information security will not be retained and awareness of crisis will diminish. As a result, there is a tendency for the problem of not feeling the educational effect to occur.

    <Task 5> The training itself has become formalized.

    Leaving challenges such as 1-4 as they are can lead to a decrease in the interest and engagement of participants, causing the training to become a mere routine. Additionally, participants may not be able to find the purpose or significance of the training, leading to a decrease in motivation to learn.

    To provide high-quality learning, it is necessary to be aware of such challenges and continuously review the training program and course content.

    3. Solutions for In-house Information Security Education

    In the previous chapter, we listed common challenges in information security education, but here we will introduce specific methods to solve these challenges.

    〈Solution to the problem 1〉Introduce training that includes practical exercises such as email training.

    Conducting practical training is highly effective for targeted attacks and phishing email countermeasures. For example, in email training, you can receive training to identify suspicious emails by experiencing simulated phishing emails. Additionally, simulating response and reporting procedures within the organization in the event of a targeted attack is also effective.
    Both of these methods, through learning in realistic scenarios, lead to the acquisition of skills that can be applied in the field.

    <Learning Designer> Solution to the problem.2 </Learning Designer> Utilizing e-learning to provide a flexible learning environment

    E-learning, which is a learning method that utilizes the internet, can provide a flexible learning environment that is not limited by time or location. Therefore, learners can choose a convenient timing to study and efficiently absorb knowledge.
    In addition, e-learning offers various formats such as videos and quizzes, making it easier to maintain concentration and avoid boredom. Furthermore, a variety of e-learning materials that keep up with trends are being released, making it possible to easily learn the latest information.

    〈Solution to the problem.3〉Conduct measurement of educational effectiveness and follow up

    After the training, it is recommended to conduct an "effectiveness measurement" to understand how much the participants have understood the learning content. Through effectiveness measurement, the results and effects of the training can be objectively evaluated, which can also be useful for improving teaching methods and materials. It can also be used to follow up with the participants in the future.
    Effectiveness measurement can be done through various methods such as conducting tests or quizzes to measure understanding of the training content, or having participants answer surveys on the training content, instructor evaluation, and satisfaction with materials.

    By incorporating these solutions, you can expect various benefits such as acquiring practical skills, increasing motivation, and solidifying knowledge.

    4. Points to Enhance the Effectiveness of Information Security Education

    Solutions to information security education challenges can also lead to improved learning outcomes. Here, in addition to the solutions introduced in the previous chapter, we will share points to further enhance learning outcomes.

    <Learning Effectiveness Enhancement Point 1> Determine the format of the training according to the participants

    There are various formats for conducting training. By flexibly combining formats according to the participants' work situation, learning style, and training objectives, effective information security education can be implemented.

    〈Example of Implementation〉
    ■In-house Lecture
    Experienced employees will act as instructors and conduct training within the company. As they can provide real and unique information, participants will acquire practical knowledge and skills. However, it is important to maintain a sense of tension as the instructor is an internal employee.

    ■Invite External Instructors
    This is a format where external experts and specialists are invited to hold seminars and lectures. As professionals, they are well-versed in the latest knowledge and trends, allowing you to obtain fresh information.

    ■ Participate in external training institutions
    By participating in external training institutions and seminars, learners can concentrate on learning in an environment away from their daily lives. They can also have the opportunity to learn about other companies' initiatives and knowledge.

    ■eLearning
    eLearning, which combines flexibility and convenience, allows learners to study according to their own schedules and environments. The ease of progress management and effectiveness measurement is also a strength.

    <Learning Effectiveness Enhancement Point 2> Choose Customizable Learning Materials

    In the field of information security, security policies and required knowledge for business may differ from company to company and industry to industry. Therefore, by choosing customizable materials for our company, we can provide more practical learning.

    <Learning Effectiveness Enhancement Point 3> Create a system for manualization and information sharing

    Information security education is not only about conducting training, but also about creating a system for sharing information such as manuals and incident cases. By sharing the latest information and countermeasures related to information security, and accumulating know-how, employees can deepen their common understanding.

    By implementing these points, the quality of education can be improved and deep learning can be promoted.

    5. Summary

    Frequent news about information leaks and loss accidents. These troubles not only result in economic losses such as compensation, but also carry the risk of instantly destroying the credibility and image of the company that has been built up. That is why security enhancement is essential for companies, and information security education holds significant importance.

    In this blog, we have explained common challenges and solutions for information security education, as well as points to enhance learning effectiveness. As a first step, it is important to provide an environment where employees receiving education can learn with enthusiasm.

    Therefore, what I would like to recommend is learning using e-learning. In addition to the convenience of being able to learn anywhere as long as there is an internet environment, the abundance of various educational materials related to information security is also attractive. Furthermore, the ease of operation and cost performance are also advantages.

    At Human Science Co., Ltd., we offer e-learning services tailored to our customers' needs, such as the "e-Training Portal (online training)" which allows for one-month training with one material, and customizable "e-Training Material Manuscript Sales".

    If you are interested, please visit Human Science Co., Ltd.'s e-learning site.

    e-training/educational material sales service