1
TABLE OF CONTENTS
Defending Against Cyber Extortion 2
Behavior Design in Security Awareness 2
Motivation 3
Ability 3
Prompts 4
Building Your Campaign 4
Raising General Awareness 5
Awareness by Top Initial Exploit Causes 5
Final Thoughts & Best Practices 7
Appendix: References & Links 8
Building a Security Awareness Program to Help
Defend Against Cyber Extortion and Ransomware