{"id":23105,"date":"2025-04-01T09:00:05","date_gmt":"2025-04-01T07:00:05","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?p=23105"},"modified":"2025-03-28T11:52:27","modified_gmt":"2025-03-28T09:52:27","slug":"developing-a-cyber-security-awareness-program-that-works","status":"publish","type":"post","link":"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/developing-a-cyber-security-awareness-program-that-works\/","title":{"rendered":"Developing a Cyber Security Awareness Program"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_3-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Data security threats are\u2002becoming increasingly advanced, and no organisation is immune to them. However, companies face daily risks, ranging from\u2002phishing scams to ransomware attacks, which can lead to data breaches, financial loss and reputational damage. Technology cannot fix the problem alone \u2014 people are the first\u2002line of defense in protecting systems. That\u2019s why building\u2002a robust Data Security awareness program is necessary.<\/p>\n<p>Employees are usually the first line of defense\u2002\u2014 or the weakest link. Even the most secure systems can fall prey to human error if they are not adequately trained and\u2002aware. A safe culture throughout the organisation\u2002is best assured by cybersecurity awareness, which educates the staff about risk reduction.<\/p>\n<h2><strong>Start with Leadership Buy-In and Clear Goals<\/strong><\/h2>\n<p>Without support from the top down, a\u2002<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> awareness program will not have buy-in. What leadership sees as an\u2002afterthought will be reflected in how employees perceive security. The first is getting executive buy-in and ensuring the program aligns with larger business\u2002objectives. Clarify the role of human behaviour\u2002in the company\u2019s cyber risk profile.<\/p>\n<p>Establish\u2002clear, quantifiable goals. Do you want to cut phishing clicks rates in\u2002half in six months? Silo departments on\u2002better password hygiene. Cut down on shadow IT? These objectives help you create a direction for your Data Security awareness program and make it easy to measure progress.<\/p>\n<p>Also, determine who\u2019s responsible for the program \u2014 whether a dedicated security awareness officer or a cross-functional team. Embed awareness activities in existing processes such as onboarding,\u2002performance reviews, and compliance sign-off\/checklists. Whenever the\u2002program is more embedded and more visible, there is a better chance that it will stick.<\/p>\n<p>Grow your Data Security team and open opportunities\u2002for your leadership potential. When\u2002employees observe executives practicing secure habits\u2014using multi-factor authentication, locking their screens, and reporting phishing attempts\u2014it reinforces the message that security is essential. Without buy-in from\u2002the top, the rest of the program won\u2019t receive the attention it needs to make a difference.<\/p>\n<h2><strong>Identify the Audience and\u2002Tailor the Training<\/strong><\/h2>\n<p>Different types of\u2002employees need different types of cyber security training. Customisation takes time, but a one-size-fits-all method is a\u2002quick road to wasting time and losing crucial time in gaps. The first step in your cybersecurity awareness program will be to segment users into specific groups based on their\u2002job function\u2014groups could include IT staff, finance teams, HR, executives, and frontline workers\u2014to tailor content for their specific risks and responsibilities.<\/p>\n<p>HR deals with loads of\u2002sensitive data, which is usually the target of the social engineer. Business email compromise attacks are most often aimed\u2002at company finance teams. Your program\u2002has to provide examples and scenarios specific to each group they will likely experience. Such personalisation\u2002makes the training more applicable and generates higher engagement.<\/p>\n<p>Asthenics is also a factor in\u2002employee tech literacy. Individual and user-level guidance is not the same as development guidance; someone who only uses a\u2002computer occasionally needs different advice than a developer or system admin. Speak plainly, steer clear of technical\u2002terminology and focus on on-the-ground actions. Impactful: Demonstrate how Data Security relates to\u2002their jobs.<\/p>\n<p>You\u2002can segment based on role and department, delivering <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> modules tailored based on risk. Make it\u2002brief, engaging and approachable. Microlearning, videos, quizzes and scenario-based\u2002exercises are more effective than long, boring lectures.<\/p>\n<p>Be sensitive\u2002to culture and language. If your organisation is in multiple regions, ensure your <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cyber security<\/a> awareness content is translated correctly and localised\u2002to be culturally relevant. A global program resonates better across\u2002the organisation and will likely create lasting behavior change.<\/p>\n<h2><strong>Make It Ongoing\u2014Not a One-and-Done<\/strong><\/h2>\n<p>Cyber security awareness programmes should evolve\u2002as fast as cyber threats do. One yearly training session isn\u2019t\u2002sufficient. Instead, awareness must be ongoing, responsive and baked\u2002into the company culture. The idea is habits, not\u2002check boxes.<\/p>\n<p>Dipping in and out\u2002of the programme, monthly phishing tests, quarterly refresher courses, and weekly tips all help keep cybersecurity at the top of employees &#8216; minds without overwhelming them. When executed correctly, they become another ingredient of the work routine.<\/p>\n<p>Gamify it. Encouraging friendly competitions\u2002between departments based on which department reports the most phishing attempts or scores the highest on the quizzes can also help boost participation. Be sure to recognise and reward\u2002employees who demonstrate good data security behaviors. Some positive reinforcement goes a long\u2002way.<\/p>\n<p>Use real-time events\u2002as teachable moments. If a new strain of ransomware makes the news, or if\u2002your company becomes the target of a phishing attack, use it as an opportunity to reinforce training. This remains a constant reminder of reality and demonstrates to staff that cybersecurity isn\u2019t theoretical and is happening right now.<\/p>\n<p>Metrics are essential here. Monitor Open\u2002Rates on training emails, Phishing Simulation Responses, Incident reports, and Feedback Surveys. Use the data to adjust your\u2002strategy even further. If a department consistently\u2002fares poorly, provide targeted follow-up. If people are not engaging with\u2002some formats, alter them.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber security<\/a> awareness is not the\u2002final end-point, but rather a journey. A strong program should evolve, mature, and expand with\u2002your organisation and the threat landscape.<\/p>\n<h2><strong>Measure Impact and Evolve the Program<\/strong><\/h2>\n<p>You can\u2019t improve what you\u2002don\u2019t measure. IT Strategy: How to Reinforce <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security<\/a> Awareness Training Program. It\u2019s not\u2002only about completion rates; it\u2019s about actual behavior change.<\/p>\n<p>Define KPIs that link back\u2002to your goals. Are employees reporting\u2002more phishing emails? So, are you seeing\u2002lower click-through rates on phishing simulations? Is the number of human error-driven\u2002incidents lower? The metrics give you an idea\u2002of how your program is performing.<\/p>\n<p>Collect qualitative data too. Surveys, interviews, and feedback forms are great tools\u2002to determine employees&#8217; feelings about the training. Are they learning anything? Do they find it helpful? Is there a disconnect between the theory and practice of cybersecurity\u2002threats? This type of feedback informs better engagement\u2002and relevance.<\/p>\n<p>A second\u2002imperative is benchmarking. Measure your metrics against industry benchmarks\u2002or peer organisations. This gives you a more explicit site overview and a great reference point to justify any future program investment. Data Security budgets are constantly being questioned \u2014 proving\u2002the benefits of such investments is key to ensuring ongoing funding.<\/p>\n<p>Use your findings to iterate. Replace outdated training material, tackle new threats and eliminate\u2002what isn\u2019t working. Cybersecurity is ever-changing; your awareness\u2002program has to be the same.<\/p>\n<p>And don\u2019t forget\u2002to keep leadership updated on progress. ROI makes executives tick, and an effective cybersecurity awareness program\u2002can provide easy-to-understand value. Share success stories, improvements, and employee wins to\u2002keep the momentum alive. It\u2019s just that if people see it works,\u2002they\u2019re more likely to stick around.<\/p>\n<h2><strong>Conclusion <\/strong><\/h2>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber\u2002security<\/a> awareness isn\u2019t a one-off project but a continuous, multi-faceted approach to educating and empowering your employees. A strong program is behaviour-based\u2002and not compliant. It trains staff to identify threats, to respond appropriately and take accountability for their responsibility in\u2002protecting the organisation.\u201d When combined with the top-down support of the leadership, company-customised content, frequent reinforcement and measurable results, your Data Security awareness program can become a solid line of defence against sophisticated threats that are constantly evolving daily. There\u2019s no blame or fear here \u2014 just providing\u2002the means and conviction for individuals to behave intelligently in a risky internet landscape. It may be the single most cost-effective investment to lower\u2002cyber risk.<\/p>\n<h2><strong><a href=\"https:\/\/digitalschoolofmarketing.co.za\/contact-us\/\">GET IN TOUCH WITH THE DIGITAL SCHOOL OF MARKETING<\/a><\/strong><\/h2>\n<p>Equip yourself with the essential skills to protect digital assets and maintain consumer trust by enrolling in the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security Course<\/a>\u00a0at the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/\">Digital School of Marketing<\/a>. Join us today to become a leader in the dynamic field of cybersecurity.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20852 size-woocommerce_single entered lazyloaded\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" alt=\"DSM Digital School of Marketing - Cyber Security\" width=\"600\" height=\"96\" data-lazy-srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" data-lazy-sizes=\"(max-width: 600px) 100vw, 600px\" data-lazy-src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" data-ll-status=\"loaded\" \/><\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Frequently Asked Questions<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-tabs style_default switch_click accordion has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"f53f\"><button class=\"w-tabs-section-header\" aria-controls=\"content-f53f\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Why is a cybersecurity awareness program important?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-f53f\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>A cybersecurity awareness program is imperative because human error is a leading cause of security breaches. Even the best technical defences can save an organisation if just one employee clicks on\u2002a malicious link or sets a weak password. A training program will train your staff to\u2002spot common threats, including phishing, ransomware and social engineering. It fosters a security-first mindset and teaches individuals what it takes\u2002to protect sensitive information in their personal and professional lives. Creating awareness gives organisations better risk\u2002exposure and better response to incidents. Beyond mere compliance, it makes a\u2002culture where cybersecurity is imbibed in day-to-day operations.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"f6c8\"><button class=\"w-tabs-section-header\" aria-controls=\"content-f6c8\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How often should cybersecurity training be conducted?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-f6c8\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Cyber security training should be continuous, not\u2002a check-the-box once a year. Annual training can be mandatory for regulatory reasons, but it does not influence behaviour or keep current\u2002with emerging threats. Organisations should aim to source some cybersecurity training\u2002on a monthly or quarterly basis. These may include phishing simulations, brief refresher classes, alerts about new or accelerated cyber threats in internal newsletters, or real-time warnings. Being consistent and repetitive reemphasises good\u2002habits and stops humanity from taking things for granted. Regular training also gets new\u2002employees up to speed and helps everyone stay ahead of the game as new attack methods are developed.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"x849\"><button class=\"w-tabs-section-header\" aria-controls=\"content-x849\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What topics should be included in a cybersecurity awareness program?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-x849\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>The content should address well-known cybersecurity awareness\u2002topics, but it should also be role-based (targeted for different groups of employees with varying knowledge levels). Core subjects are phishing awareness, password best practices, secure\u2002searching, mobile gadget security, and recognising social engineering. Training for employees with sensitive data should also focus on secure data handling practices, encryption basics, and privacy regulations. Role-based modules for HR, finance, IT and relevant departments across the\u2002organisation can provide leads on specific threats they are prone to, such as payroll fraud or spear phishing. The program must also deliver us short\u2002common, real-life iterations and a regimen to hone key learnings.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"g9c4\"><button class=\"w-tabs-section-header\" aria-controls=\"content-g9c4\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How can we measure the effectiveness of a cybersecurity awareness program?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-g9c4\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>For effectiveness, track\u2002quantitative and qualitative indicators. Key performance metrics may include phishing\u2002simulation clicks, number of threats reported, password hygiene compliance, or training module completions. Over time, improvements in these measures indicate behaviour\u2002change. You can also analyse if human-related security\u2002events were decreasing through incident trends. Qualitative employee feedback is just as important\u2002\u2014 you can use surveys and interviews to gauge how confident staff are that they know how to detect and respond to threats. It provides\u2002context for your findings and justifies additional investment in them. Submitting these metrics for leadership back to\u2002the executive level shows ROI and maintains the executive level buy-in.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"wb41\"><button class=\"w-tabs-section-header\" aria-controls=\"content-wb41\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Who should be responsible for managing a cybersecurity awareness program?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-wb41\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>While\u2002managing a Data security awareness program should be a shared responsibility, someone should ideally lead it with a clear mandate. In larger organisations, this could be\u2002someone in the role of Security Awareness Officer, someone on the Information Security team, or someone from Risk Management. In smaller companies, it may\u2002fall under the purview of the IT manager or a cross-functional team. Whatever his title\u2002may be, the person in charge should understand security and communication. They will also have to work with HR, compliance and leadership to incorporate training into onboarding, internal communications\u2002and policy enforcement. They also need to stay abreast of\u2002emerging threats and evolving best practices in the industry to ensure training remains relevant.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"lcbd\"><button class=\"w-tabs-section-header\" aria-controls=\"content-lcbd\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How do you keep employees engaged in Data security training?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-lcbd\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Keeping employees engaged in cyber security training helps to keep it relevant, interactive, and convenient. Dull, extended modules won\u2019t\u2002maintain interest. Instead, employ microlearning\u2014concise and targeted lessons that accommodate busy\u2002calendars. Add case studies, role\u2002plays and quizzes to help you learn and make it feel real. Adapt information for various roles so\u2002employees can understand how cybersecurity affects their work. Gamification can drive participation by providing badges, leaderboards, or small rewards for completing training or identifying phishing\u2002attempts. Ensure content is refreshed regularly to deal with\u2002current threats and does not get repeated. Crosstrain across multiple modalities, like email, chat, or your intranet, to\u2002meet people where they are. Above all else, connect training to the larger\u2002context.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":950,"featured_media":23096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[771],"tags":[],"class_list":["post-23105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/950"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=23105"}],"version-history":[{"count":2,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23105\/revisions"}],"predecessor-version":[{"id":23107,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/23105\/revisions\/23107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/23096"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=23105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/categories?post=23105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/tags?post=23105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}