Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Security awareness training arms users with the knowledge needed to avoid falling victim to attacks

June 30, 2021

Security awareness training arms users with the knowledge needed to avoid falling victim to attacks
Attackers are more focused on con artistry and attacking the human element than ever. How can you “install antivirus on the brains of your users?” With security awareness training. We spoke to Ingram Micro Technology Consultant II Jacob White to learn more about security awareness training and how it can help educate users so they’re always making the best decisions and keeping company information safe. 
Attackers in the modern era have found great success in using social engineering to meet their goals. 
Social engineering, or the act of psychologically manipulating users into divulging information, has become a major threat to the security of today’s organizations. Attackers are very focused on the people element. In fact, according to the Verizon 2021 Data Breach Information Report, the first way hackers got into a network was phishing attacks, while the second was stolen credentials (which can be obtained from social engineering methods).  
How does the “human element” play a part? 
Social engineering capitalizes on humans’ natural instinct to communicate. In today’s world we have so many ways to communicate, whether it be traditional methods like phone or email to more modern collaboration tools like Microsoft Teams, Zoom, Slack and others. For a hacker, these are all opportunities to breach; humans are often known as the weakest link in a security chain. Security awareness training looks at the way we interact with one another on these platforms/tools and then simulates how one would behave. Through tools and assessments we can send simulated attacks to our users and see if they fall for it. Follow-up occurs whether the employee “passes” or “fails”: we congratulate the user who successfully identifies the attempt and help further educate the employee who may click or divulge information. 
How do simulated attacks work? 
A simulated attack is most frequently composed of phishing (email) or vishing (voice). Traditionally, this has been offered as a service—experts craft the phishing messages, perform the attack and give a report card after the engagement. That’s great for “point in time” checks, however, you want to ideally run these simulations continuously over time to gauge learning and compliance campaign over campaign. Intersperse education in between campaigns to ensure employees have enough knowledge to act properly and over time you’ll see the metrics of compliance rise. 
How should security awareness training be approached? 
Over time, users become more resilient to these methods and can identify bad behavior to protect themselves and the organization from attack. Keep running simulations and make a continuous process, measure each round compared to the previous and don’t be afraid of failure. Reward those who can see the social engineering elements and don’t punish those who click—provide more guidance and education. Incentivize to do well. 
Ingram Micro’s Cybersecurity Delta Force is here to help connect you to security awareness training assessments and vendors. Leverage our team to help work through available options that meet your needs. 

Security Awareness Training 101:
Get an introduction from Jacob White, Ingram Micro technology consultant II, on security awareness training and how it protects businesses.
Watch Video

Security Awareness Training 201:
Take a deeper dive into the topic of security awareness training with Jacob White, Ingram Micro technology consultant II.
Watch Video


Our security experts have provided additional resources to help you further understand the impact of security awareness training and how it can help arm users with important knowledge to protect against breaches.
Case studies/examples in action:
Don’t just take it from us—hear from industry experts about the importance of security awareness training with case studies and other media.
Recent examples:
If a robust security awareness training strategy was in place, perhaps these organizations would not have been impacted.
Training resources:
Learn more from industry experts and trusted vendor partners.
Selected Vendor Partners
  • Ingram Micro Digital Transformation Solutions
  • Ingram Micro Training 
  • Proofpoint 
  • Cofense 
  • Mimecast 
  • KnowBe4 
  • Cymulate 
  • Cisco 
  • ERMProtect 


Contact Us