lutz logo
lutz logo
  • Services
  • News & Insights
  • About
  • Client Portal
Search
  • Services
  • Accounting
  • Advisory
  • Financial
  • M&A
  • Talent
  • Tech
  • Accounting Services
Services
  • Audit & Assurance
  • Client Advisory Services
  • Outsourced Accounting
  • Tax
  • Business Valuation
  • Litigation Support & Forensic
View All
Industries
  • Agribusiness
  • Construction
  • Family Office
  • Healthcare
  • Manufacturing & Distribution
  • Nonprofit
View All
News & Insights
Financial Access Checklist
Guide
Financial Access Checklist

Share this information with your spouse to assure you each have access to manage important financial tasks independently.

Read More
  • Advisory Services
Services
  • Accounting
  • Financial
  • M&A
  • Talent
  • Tech
View All
Resources
The Art of Budgeting
Recording
The Art of Budgeting + Smart Saving Strategies
Learn how to get your finances under control and increase your savings! Hear real-life examples and best practices to secure a successful future.
Watch Now
Business Insights
Comparing Business Valuation Methods
Blog
Comparing Business Valuation Methods: Which is Right for You?
Valuation experts rely on three primary approaches to determine the value of a business: income approach, asset approach, and market approach.
Read More
  • Financial Services
Services
  • Financial Planning
  • Investment Advisory
  • Retirement Plan Services
  • Pooled Employer 401(k) Plan
View All
Resources
  • Lutz Financial Blog
  • Our Team
  • Client Portal
  • Charles Schwab Login
  • Send Files Securely
Contact Us
NEWS & INSIGHTS
Website Featured Content Images
Market Commentary
Financial Market Updates

Want to receive financial market updates straight to your inbox? Sign up below!

Subscribe
  • M&A Services
Services
  • Sell-Side Representation
  • Transaction Advisory
  • Exit Planning
  • Business Valuation
View All
Resources
Selling a C Corporation
Blog
Factors to Consider When Selling a C Corporation

Understand the tax issues affecting both buyers and sellers involved in C corporation merger and acquisition transactions

Read More
Business Insights
Post-Acquisition Checklist
Guide
Post-Acquisition Checklist for a Seamless Transition
To help you navigate this critical period, we've compiled a comprehensive checklist covering key areas that demand attention after the deal closes. 
Read More
  • Talent Services
Services
  • Search & Staffing
  • Outsourced HR
  • HR Consulting
View All
Candidate Resources
  • Job Seeker Process
  • Current Opportunities
  • Lutz Internships
Contact Us
News & Insights
Overcoming Bias in Recruitment
Blog
Unconscious Bias in Recruitment: How to Overcome It
Learn how to take the bias out of recruitment and build a diverse, talented workforce with these tips.
Read More
  • Tech Services
Services
  • Outsourced IT
  • Data Analytics
  • Technology Strategy
  • Software Consulting
View All
Resources
When to outsource your IT
Blog
How to Know When It's Time to Partner with an IT Pro

One day your technology seems manageable, and the next you're wondering if you need more support. Here are the clear signs it's time to outsource your IT.

Read More
Business Insights
Untitled design (1)-Mar-08-2024-08-50-35-9527-PM
Video
Pella Client Testimonial
"I've used them for valuation work, stock transfers, hosting all of my technology, and now data analytics. I'd say they lead the pack in terms of anticipating what I'm going to need before I even know I need it."
View Now
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
Webinars & Events
Events
Register Today

Register for an upcoming event or access our library of on-demand recordings.

View All
Financial Market
COMMENTARY
Stay Informed

Catch up on market moves with our weekly update, featuring in-depth insights and analysis.

View All
Resources
EBOOKS & GUIDES
Download Now

Take a deep dive into challenging business topics with these free educational resources. 

View All
  • News & Insights
  • Business Insights
  • Webinars & Events
  • Financial Market
  • Resources
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
  • About
About

Lutz is a business solutions firm for people seeking a partner to help energize and heighten economic and organizational success.

Our Company
Our Team
Offices
Careers
Internships
Contact Us
  • Contact
Client Portal

Log in to your relevant client portal to access your account, upload documents, or make a payment.

Make a Payment
Accounting Client Portal
Financial Client Portal
Charles Schwab Login
Send Files Securely
Contact Us
  • Cybersecurity

Effective Cybersecurity Training for Businesses

Jim DeBoer, Service Manager
October 15, 2021
Effective Cybersecurity Training for Businesses

Cybercrime is here to stay. Hacking methods are becoming increasingly sophisticated as cybercriminals advance their tactics. This makes cybersecurity training an essential element of a business security policy. Here is how your business can implement effective cybersecurity training measures. 

 

Establish a Cybersecurity Policy

Develop a cybersecurity policy for your business so it’s easy for employees to understand what is required of them when it comes to online practices. Use this as a foundation for your business’s cybersecurity training program.

For the training program to be successful, you will need to get buy-in from leadership. Explain the the benefits of a cybersecurity training program, and the cost of not training employees properly. Once you have management on board, have them complete the training program before implementing company-wide to get better adoption from staff.

 

Threat Identification and Reporting

Cyber threat identification and reporting are the basis of preventing attacks. So, businesses should train employees to recognize potential threats. Although recognizing phishing emails may seem easy, human error is one of the leading causes of cyberattacks.

Employers should look at cybersecurity training as a way to avert losses. Businesses should aim at eliminating risky employee behaviors and increasing vigilance. Focus on training that addresses immediate security dangers such as insider threats, phishing, and ransomware.

Cybersecurity training should be mandatory and ongoing. A single untrained employee poses a threat to the whole network. Be sure to include training when onboarding new hires to familiarize them with the company's cybersecurity policy.

 

Passwords and Authentication Enforcement

Businesses should enforce strong password policies to deter hackers and password guessers. Here are a few examples of good password behavior:

  • Do not repeat passwords
  • Do not keep lists of passwords in unsecured documents
  • Change passwords regularly
  • Longer passwords with letters, numbers and special characters are harder to guess

Companies can also implement multi-layered authentication systems to double verify those who request network access. Passwords alone may not be effective at stopping unauthorized network visitors. With two-factor authentication, the correct password prompts the network to issue a login code for confirmation.  The code is shared via a secure email or text registered with the user.

Password managers are great insurance tools against poor user management. They can securely store passwords and suggest stronger passwords when an employee chooses a weak one. Companies that invest in password managers worry less about passwords falling into the wrong hands.

 

Practice Attacks

Practice attacks are essential to ascertain the effectiveness of a business's cybersecurity policy. These are friendly (ethical) hacking attempts that simulate an attack on the network to exploit its vulnerabilities.

Some examples of common practice attacks include the following:

1.   Network Testing

This type of testing prevents unauthorized access to servers and systems by finding and eliminating network vulnerabilities. Network testing could involve a simple vulnerability assessment aimed at unearthing security vulnerabilities and other flows in the network. Penetration testing is more detailed and involves attacking your network to find real-time vulnerabilities that hackers could exploit. 

2.   Application Testing

Company networks may be very secure but still plagued by vulnerabilities caused by unsecured applications and software. With so many applications used daily, this becomes critical. Web and mobile application testing identify security vulnerabilities and ensures that they remain compliant with cybersecurity laws.

3.   Social Engineering

Social engineering tries to exploit the human element of the network by tricking and gauging users' responses. Research has found that users may be the weakest link in a network.

Some of the tests in social engineering include sending phishing emails, calls, SMSs, and any other mediums that hackers use to employees. The primary purpose of such an assessment is to determine employee response and train them accordingly.

 

Take Away

Cybersecurity training is essential for companies to protect their data and clients. In the long run, diagnosing and fixing vulnerabilities ahead of time will save you more time and money than trying to recover from a cyber attack's financial, legal, and business loss consequences.

Lutz Tech trains businesses on the best approaches to cybersecurity to keep your business and information better protected. Contact us if you have any questions or learn more about our cybersecurity education services.

  • Arranger, Analytical, Learner, Achiever, Input

Jim DeBoer

Service Manager

Jim DeBoer, Service Manager, began his career in 2005. With nearly two decades of experience in IT, he has advanced through roles ranging from technology administration to service engineering, gaining a comprehensive understanding of IT operations and client support. 

Managing Lutz Tech's service and escalation teams, Jim leads efforts to resolve complex technology problems and improve service processes. He applies his analytical mindset to staff training, system design, and issue resolution—ensuring that technical challenges are addressed with user-friendly, efficient solutions. Jim values making complicated situations easier to navigate for both clients and team members. 

 

Jim lives in Omaha, NE, with his family.

402.778.7950

jdeboer@lutz.us

Connect on LinkedIn

Recent News & Insights

Job Seeker
5 Ways to Maximize Your Chances of Employment
Let’s face it, job searching can be a rollercoaster. One moment you're motivated, the next ...
Read More
Guide
Finding a Lifelong Career
You’ll spend over 90,000 hours of your life at work. That’s more time than you’ll spend with ...
Read More
Rural Hospital
CMS Announces New Method II Billing Edits for Critical Access Hospitals
Starting July 1, 2025, Critical Access Hospitals (CAHs) that bill under Method II will face a ...
Read More
Market Commentary
The Dollar and International Diversification + 4.30.25
With recent tariff and trade news, the tone and trading of the dollar has decidedly changed. ...
Read More
module-bg-desktop module-bg-mobile

Let’s get you where you want to go.

We work to simplify complexities, help make critical business decisions, and confidently focus on the things that are truly important to you. We embrace your business as our own to spark the right solutions and help you thrive.
Contact Us
Lutz-Logo-white
  • Services
    • Accounting
    • Consulting
    • Financial
    • M&A
    • Talent
    • Tech
  • About
    • Our Company
    • Our Team
    • Offices
    • Careers
    • Internships
    • Current Opportunities
  • Client Portal
    • Make a Payment
    • Accounting Client Portal
    • Financial Client Portal
    • Send Files Securely
    Submit RFP
TOLL-FREE: 866.577.0780 | © Lutz & company, PC 2025 | Privacy Policy
Follow us on Facebook Follow us on LinkedIn Twitter - X Logo Follow us on Instagram Follow us on Facebook