Posters can be a great way to communicate your message; such as the best way for ordinary computer users to protect themselves or a roadmap to help you plan, build and implement your security awareness program. These resources are developed by the community for the community. These posters are distributed under the Creative Commons BY-NC-ND 3.0 license. You are welcome and encouraged to download, print and share these posters as long as you do not modify them. Please send any questions or any feedback on how to improve these resources to email@example.com.
Creating a Cyber Secure Home
This poster walks families through the five key steps on how to create a cyber secure home. What makes this poster so powerful, is these are also the very same secure behaviors that most organizations want employees to exihibit at work.
Protecting Healthcare Data
This poster explains to healthcare professionals what healthcare data is, why it needs to be protected, where its located, and top tips on how to secure it. If your organization handles PHI this is a great resource to assist in your security awareness program.
You Are A Target
This poster identifies and explains different ways cyber criminals can make money from a hacked computer. This helps ordinary computer users understand why they are a target and how they are worth money. This is an excellent resource to actively engage people in your awareness program. This poster is based on the original work of Brian Krebs.
Don't Get Hooked
This poster teaches people how to identify phishing and spear phishing emails. It provides an example of a common phishing email and the most common indicators that it is an attack. This poster was created as a community project based on input from numerous individuals and organizations.
Security Awareness Roadmap
This poster walks you through step-by-step how to build an engaging, high-impact security awareness program. Included are templates, checklists and documents that provide everything you need to plan, maintain and measure your program.
Controls Systems Are A Target
This poster identifies and explains different reasons why and how cyber attackers will target Industrial Control Systems / SCADA networks. This is an excellent awareness resource for critical infrastructure.
NERC Standards Mapping to Critical Security Controls
This poster maps the different NERC CIP standards (ver 03, 04 and 05) to the Critical Security Controls.