• Tel: (270) 282-4926
  • info@coretechllc.com
  • 1711 Destiny Lane Suite 116, Bowling Green
Make an Appointment
CoreTech LLC
  • Home
    • Login / Logout
    • Create An Account
    • Downloads
    • Sitemap
  • About Us
    • Who are we?
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
    • Media Portal
    • Client Case Studies
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
      • SOPHOS Security Solutions
      • Email Encryption
      • Enterprise Mobility Management Solutions
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Dropbox Cloud Storage
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • Electronic Medical Records
      • IT for Law
      • Manufacturing IT
      • IT for Education
      • Residential Computer Repair
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Official Dell Dealer
      • Lenovo Official Reseller
      • Office Relocation Services
    • Software Services
      • Microsoft Office 365
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Mobile Device Management
    • Media & Internet Services
      • Website Design
      • InSite ID for Websites
  • Cybersecurity
    • Cybersecurity Overview
    • Get a Risk Assessment
    • Dark Web Monitoring
    • Phishing Simulation
    • Endpoint Security Solutions
    • Compliance Standards
    • Multi-Factor Authentication
    • Security Training For employees
    • Penetration Testing
  • News
    • News & Press Releases
    • Our Newsletter
    • Ultimate Guide to Hiring an IT Provider
  • Blog
  • Support
    • How To Request Support
    • Help Desk
    • Pay Your Bill
  • Contact Us

CoreTech Blog

  1. You are here:  
  2. Home
  3. Blog
  4. Josh Gossett
  5. The One Lesson Business Owners Miss When Training Employees That Can Cost Them Thousands

CoreTech Blog

CoreTech has been serving the Bowling Green area since 2006, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.
Home
Categories
Tags
Categories:   All Categories
Suggested keywords
x
Search

The One Lesson Business Owners Miss When Training Employees That Can Cost Them Thousands

CoreTech Blog
Josh Gossett
Tuesday, 11 July 2023
July_Blog_3-1

Training employees on anything can be an expensive process. You incur the cost of investing in necessary materials plus the time it takes away from your employees doing revenue-generating activities. But what’s worse when it comes to cyber security training is the expense you’ll incur if that training fails.

Recent studies show that human error plays a role in a shocking 90% of data breach cases!

Smart business owners are taking a proactive approach and training their employees on cyber security do’s and don’ts. While we applaud their efforts and encourage all owners to take this step, research suggests their efforts aren’t paying off. Despite their willingness to train employees, the number of data breaches continues to increase.

What gives? We’ll be first to say it – cyber security training can be boring. And what happens during boring presentations? People aren’t engaged, so they tune out and miss the critical information needed to keep your company secure. After the presentation, they sign off, saying they have learned the lessons, but have they really or are they a ticking time bomb in your organization?

The latter is likely true. If you want the information to stick, you must take some additional steps – and the most important is putting them to the test!

According to Education World, interactive activities are six times more effective when learning and remembering material than simply listening to a lesson. You can incorporate this tactic by putting employees to the test to find out whether or not they can apply what they learned.

One of the best ways to do this is to use phishing simulations. Here’s how the process works:

  1. A third party creates a realistic but fake phishing e-mail that shows identifiable signs discussed in the training. An example could be creating an e-mail that is similar to the CEO’s requesting private information, an outside company sending a bad link, etc. You can customize it to look like something relevant that your employees could potentially see and fall for.
  2. The employees are then put to the test. You choose which employees will receive what links and what dates the e-mails will be sent.  Will they be able to identify the threats or will they fall for the scams?
  3. The results are collected and shared with you to develop more comprehensive training programs and help you identify which employees are your biggest risks so you can provide specific coaching.

Another great way to use phishing simulations is to send out the tests before the training. When employees see that people in the company are making mistakes, they are more likely to pay attention to the lesson.

It’s not enough to just teach the information! It must be learned and implemented every day to be effective and keep your organization secure.

 
Why Are Business Owners Afraid to Move to the Clou...
Understanding the Five Levels of Delegation

About the author

Josh Gossett

Josh Gossett

I consider myself a very eclectic driven individual. I am an entrepreneur at heart and am addicted to self improvement. I enjoy creating my own objectives and path in life rather that be within my company or with my family. I live by the philosophy to always strive to be the best version of yourself. I love people and therefore I love the service industry. Success in life and in business is what I look for in every day!

Author's recent posts

More posts from author
Wednesday, 07 May 2025 What Are the Windows End-of-Life Business Risks If You Don’t Upgrade?
Wednesday, 23 April 2025 5 Ways Windows Updates for Business Keep You Secure and Legal
Wednesday, 16 April 2025 What Are the Hidden Dangers of Outdated Windows Systems in Business?
Comment for this post has been locked by admin.
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Tuesday, 13 May 2025

Captcha Image

Posts by Topic

CoreTech Blog
Technology
Security
Business
Best practices
Tip of the Week
How to
Cloud
Miscellaneous
VoIP
Alerts
IT Blog
Off Topic/Fun
Uncategorized

Tag Cloud

Cybersecurity Google Security Tip of the Week Internet User Tips Hackers Network Security Business security Privacy Software Innovation IT Services Best Practices Business Hardware Efficiency IT Support Productivity Business Computing Malware Cloud Workplace Strategy Data Technology

Blog Archive

2025
January (19)
February (16)
March (17)
April (17)
May (6)
June
July
August
September
October
November
December
2024
January (21)
February (19)
March (20)
April (20)
May (21)
June (19)
July (20)
August (15)
September (16)
October (14)
November (17)
December (20)
2023
January (18)
February (17)
March (19)
April (17)
May (21)
June (21)
July (20)
August (19)
September (21)
October (21)
November (18)
December (19)
2022
January (18)
February (16)
March (16)
April (17)
May (16)
June (16)
July (18)
August (17)
September (19)
October (20)
November (17)
December (17)
2021
January (15)
February (14)
March (14)
April (19)
May (18)
June (17)
July (17)
August (18)
September (16)
October (17)
November (18)
December (17)
2020
January (15)
February (12)
March (13)
April (22)
May (13)
June (14)
July (14)
August (13)
September (13)
October (14)
November (13)
December (13)
2019
January (14)
February (12)
March (13)
April (14)
May (14)
June (13)
July (14)
August (13)
September (13)
October (13)
November (13)
December (13)
2018
January (14)
February (12)
March (13)
April (13)
May (13)
June (14)
July (13)
August (14)
September (12)
October (14)
November (13)
December (13)
2017
January (13)
February (12)
March (15)
April (12)
May (15)
June (13)
July (13)
August (13)
September (13)
October (13)
November (13)
December (13)
2016
January (11)
February (9)
March (6)
April (8)
May (7)
June (14)
July (14)
August (15)
September (17)
October (13)
November (13)
December (14)
2015
January
February
March
April
May
June
July
August
September (7)
October (7)
November (10)
December (8)

About CoreTech

CoreTech has been serving the Kentucky area since 2006, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses. Our experience has allowed us to build and develop the infrastructure needed to keep our prices affordable and our clients up and running.

get a free quote

Recent News

How to Kick Things Off With Bluesky
Last week, we discussed why X—the social media network once known as Twitter—has been losing many users. Here, we wanted to direct those seeking a move to consider the up-and-coming platform known as Bluesky in case you were one of those jumping ship...
Read More

Contact Us

1711 Destiny Lane Suite 116
Bowling Green, Kentucky 42104

Mon to Fri 8:00am to 5:00pm

help@coretechllc.com

(270) 282-4926


Nashville Managed IT
Louisville and Lexington Managed IT
Bowling Green Managed IT
Clarksville Managed IT

Copyright © CoreTech. All Rights Reserved. | Remote Support

poweredbyjoomconnect_white

CoreTech LLC
  • Home
    • Login / Logout
    • Create An Account
    • Downloads
    • Sitemap
  • About Us
    • Who are we?
    • Our Difference
    • IT Industry Secret
    • Testimonials
    • Employment
    • Refer a Colleague or Friend
    • Media Portal
    • Client Case Studies
  • IT Services
    • Managed IT Services
      • Managed Services
      • IT Consulting
      • Comprehensive IT Support
      • Remote Monitoring & Maintenance
      • IT Vendor Management
      • Co-Managed IT
      • VMware
      • 24/7 Help Desk
      • Microsoft Hyper-V
      • Desktop Monitoring and Management
      • Infrastructure Support Services
    • IT Security Services
      • Network Security
      • Unified Threat Management
      • Content Filtering
      • Spam Protection
      • Security Cameras
      • SOPHOS Security Solutions
      • Email Encryption
      • Enterprise Mobility Management Solutions
      • Access Control Solutions
    • Cloud Computing Services
      • Cloud IT Solutions
      • Hosted Microsoft Exchange
      • Hosted Server
      • Hosted Desktop
      • Hardware Virtualization
      • Cloud Backup & File Sharing
      • Dropbox Cloud Storage
      • Cloud Hosted VoIP
    • Industry Specific
      • Healthcare IT
      • Electronic Medical Records
      • IT for Law
      • Manufacturing IT
      • IT for Education
      • Residential Computer Repair
      • IT for Nonprofits
    • Data Services
      • Business Continuity
      • Data Retrieval
    • Hardware Services
      • Hardware as a Service
      • Computer Repair
      • Cabling and Wiring
      • Wireless Services
      • High-Speed Internet Consulting
      • Printer Management
      • Official Dell Dealer
      • Lenovo Official Reseller
      • Office Relocation Services
    • Software Services
      • Microsoft Office 365
      • Microsoft Partner Network
    • Business Communication
      • VoIP
      • Mobile Solutions
      • Fax Server
      • Conferencing
      • Mobile Device Management
    • Media & Internet Services
      • Website Design
      • InSite ID for Websites
  • Cybersecurity
    • Cybersecurity Overview
    • Get a Risk Assessment
    • Dark Web Monitoring
    • Phishing Simulation
    • Endpoint Security Solutions
    • Compliance Standards
    • Multi-Factor Authentication
    • Security Training For employees
    • Penetration Testing
  • News
    • News & Press Releases
    • Our Newsletter
    • Ultimate Guide to Hiring an IT Provider
  • Blog
  • Support
    • How To Request Support
    • Help Desk
    • Pay Your Bill
  • Contact Us