{"id":34966,"date":"2020-05-13T15:00:04","date_gmt":"2020-05-13T15:00:04","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91086"},"modified":"2020-05-13T15:00:04","modified_gmt":"2020-05-13T15:00:04","slug":"empowering-your-remote-workforce-with-end-user-security-awareness","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/","title":{"rendered":"Empowering your remote workforce with end-user security awareness"},"content":{"rendered":"<p>COVID-19 has rapidly transformed how we all <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/03\/05\/our-commitment-to-customers-during-covid-19\/\" target=\"_blank\" rel=\"noopener noreferrer\">work<\/a>. <a href=\"https:\/\/www.csoonline.com\/article\/3534521\/3-ways-covid-19-is-changing-ciso-priorities.html\" target=\"_blank\" rel=\"noopener noreferrer\">Organizations need quick and effective user security and awareness training<\/a> to address the swiftly changing needs of the new normal for many of us. To help our customers deploy user training quickly, easily and effectively, we are announcing the availability of the Microsoft <a href=\"https:\/\/security.microsoft.com\/attackSimulatorTrainings\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity Awareness Kit<\/a>, delivered in partnership with Terranova Security. For those of you ready to deploy training right now, access your kit <a href=\"https:\/\/security.microsoft.com\/attackSimulatorTrainings\" target=\"_blank\" rel=\"noopener noreferrer\">here.<\/a> For more details, read on.<\/p>\n<p>Work at home may happen on unmanaged and shared devices, over insecure networks, and in unauthorized or non-compliant apps. The new environment has put cybersecurity decision-making in the hands of remote employees. In addition to the rapid dissolution of corporate perimeters, <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/08\/microsoft-shares-new-threat-intelligence-security-guidance-during-global-crisis\/\" target=\"_blank\" rel=\"noopener noreferrer\">the threat environment is evolving rapidly as malicious<\/a> actors take advantage of the current situation to mount coronavirus-themed attacks. As security professionals, we can empower our colleagues to protect themselves and their companies. But choosing topics, producing engaging content, and managing delivery can be challenging, sucking up time and resources. Our customers need immediate deployable and context-specific security training.<\/p>\n<h3>CYBERSECURITY AWARENESS KIT<\/h3>\n<p>At RSA 2020 this year, we <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/microsoft-partners-with-terranova-security-for-security\/ba-p\/1170747\" target=\"_blank\" rel=\"noopener noreferrer\">announced our partnership with Terranova Security,<\/a> to deliver integrated phish simulation and user training in Office 365 Advanced Threat Protection later this year. Our partnership combines Microsoft\u2019s leading-edge technology, expansive platform capabilities, and unparalleled threat insights with Terranova Security\u2019s market-leading expertise, human-centric design and pedagogical rigor. Our intelligent solution will turbo-charge the effectiveness of phish simulation and training while simplifying administration and reporting. The solution will create and recommend context-specific and hyper-targeted simulations, enabling you to customize your simulations to mimic real threats seen in different business contexts and train users based on their risk level. It will automate simulation management from end to end, providing robust analytics to inform the next cycle of simulations and enable rich reporting.<\/p>\n<p>Our Cybersecurity Awareness Kit now makes available a subset of this user-training material relevant to COVID-19 scenarios to aid security professionals tasked with training their newly remote workforces. The kit includes videos, interactive courses, posters, and infographics like the one below. You can use these materials to train your remote employees quickly and easily.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91089\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-1007x1024.png\" alt=\"Beware of COVID-19 Cyber Scams\" width=\"1007\" height=\"1024\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-1007x1024.png 1007w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-295x300.png 295w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-768x781.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams.png 1278w\" sizes=\"auto, (max-width: 1007px) 100vw, 1007px\"><\/p>\n<p>For Security Professionals, we have created a simple way to host and deliver the training material within your own environment or direct your users to the Microsoft 365 security portal, where the training are hosted as seen below. All authenticated Microsoft 365 users will be able to access the training on the portal. Admins will see the option to download the kit as well. Follow the simple steps, detailed in the README, to deploy the awareness kits to your remote workforce.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-91090\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-2.jpg\" alt=\"For Security Professionals, we have created a simple way to host and deliver the training material within your own environment or direct your users to the M365 security portal, where the trainings are hosted as seen below. All authenticated M365 users will be able to access the training on the portal. Admins will see the option to download the kit as well. Follow the simple steps, detailed in the README, to deploy the awareness kits to your remote workforce. \" width=\"800\" height=\"428\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-2.jpg 800w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-2-300x161.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-2-768x411.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/05\/Beware-of-COVID-19-Cyber-Scams-2-389x209.jpg 389w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<h3>ACCESSING THE KIT<\/h3>\n<p>All Microsoft 365 customers can access the kit and directions on the Microsoft 365 Security and Compliance Center <a href=\"https:\/\/security.microsoft.com\/attackSimulatorTrainings\" target=\"_blank\" rel=\"noopener noreferrer\">through this link<\/a>. If you are not a Microsoft 365 customer or would like to share the training with family and friends who are not employees of your organization, Terranova Security <a href=\"https:\/\/terranovasecurity.com\/demo-microsoft\/?utm_campaign=En_MicrosoftDemoRequest_2020&amp;utm_medium=-&amp;utm_source=Microsoft\" target=\"_blank\" rel=\"noopener noreferrer\">is providing free training material for end-users<\/a>.<\/p>\n<p>Deploying quick and effective end-user training to empower your remote workforce is one of the ways Microsoft can help customers work productively and securely through COVID-19. For more resources to help you through these times, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/secure-remote-work?rtc=1\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft\u2019s Secure Remote Work Page<\/a> for the latest information.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/13\/empowering-remote-workforce-security-training\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>To help customers deploy quick and effective security training to their remote workforce, we are announcing the availability of the Microsoft Cybersecurity Awareness Kit.<br \/>\nThe post Empowering your remote workforce with end-user security awareness appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34967,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[8412,347,2564,8533],"class_list":["post-34966","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance-and-security","tag-cybersecurity","tag-cybersecurity-policy","tag-secure-remote-work"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-13T15:00:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1007\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Empowering your remote workforce with end-user security awareness\",\"datePublished\":\"2020-05-13T15:00:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/empowering-your-remote-workforce-with-end-user-security-awareness.png\",\"keywords\":[\"Compliance and security\",\"Cybersecurity\",\"Cybersecurity Policy\",\"Secure remote work\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/\",\"name\":\"Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/empowering-your-remote-workforce-with-end-user-security-awareness.png\",\"datePublished\":\"2020-05-13T15:00:04+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/empowering-your-remote-workforce-with-end-user-security-awareness.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/empowering-your-remote-workforce-with-end-user-security-awareness.png\",\"width\":1007,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/empowering-your-remote-workforce-with-end-user-security-awareness\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance and security\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/compliance-and-security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Empowering your remote workforce with end-user security awareness\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/","og_locale":"en_US","og_type":"article","og_title":"Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-05-13T15:00:04+00:00","og_image":[{"width":1007,"height":1024,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Empowering your remote workforce with end-user security awareness","datePublished":"2020-05-13T15:00:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/"},"wordCount":552,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png","keywords":["Compliance and security","Cybersecurity","Cybersecurity Policy","Secure remote work"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/","url":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/","name":"Empowering your remote workforce with end-user security awareness 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png","datePublished":"2020-05-13T15:00:04+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/05\/empowering-your-remote-workforce-with-end-user-security-awareness.png","width":1007,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/empowering-your-remote-workforce-with-end-user-security-awareness\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Compliance and security","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance-and-security\/"},{"@type":"ListItem","position":3,"name":"Empowering your remote workforce with end-user security awareness"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34966"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34966\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34967"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}