Who said security can’t be fun? Photo contests can be simple, user-friendly experiences with the ability to reach and engage any size audience. We have been saturated by “selves,” and what better way to use them than to turn those images into a contest? Have your audience submit photos that depict what security awareness means to them (a family/group of employees dressed as super heroes, or a baby dressed as a ninja standing on a keyboard). Creativity will be high as your audience determines what will get them victory. It’s important to determine what your contest goals/ rules are, how you will administer the contest, how will you determine the winner and what the lowcost prize will be. This may work best when targeted to
Through the use of security cubicles, you can allow your audience to participate in mock security scenarios where they work through high-risk problems (for example, show an image of a workstation and ask the employee to identify all the visible security risks). This interactive form of gaming gets the participants involved and invested in solving the problem. Simply set up laptop stations in high-volume areas with simple activities preloaded,
Phishing Email Contest
It’s challenging to keep your phishing program relevant to your audience without employing some customization. Get your target phishing population involved by having them craft the phishing email, putting themselves in the mind of the attacker. Privately select the top few and test them to determine which approach had the most victims. You can award the winning author with a small prize and lots of corporatewide recognition.
Architect a digital scavenger hunt by using free apps like Huntzz and Klikaklu. These apps allow you to create complete hunts from beginning to end, are easy to use and work with most mobile devices. The hunt can require that participants follow clues in order to take photos that will eventually advance them to the end, where a
Facilitate a day where your employees can bring any personal documents to the offce and use the corporate shredding facility to destroy them. Make the connection that they care about secure destruction of their own private data, so they should also act likewise when working with customer/corporate data.
Promote a day where your employees can bring in old, outdated or broken electronics to eitherdestroy or donate (after being securely wiped) to a school or charity.