Review Your Cybersecurity Awareness

In 2018, a person couldn’t listen to the news without hearing of the latest company breach, which included many well-known companies such as Adidas, Timehop, Saks Fifth Avenue, Panera, T-Mobile and Facebook. 

Several of these breaches affected subscribed users or patrons by exposing their personally identifiable information which they entrusted to these companies.

Some breaches were caused by insider threats, some by social engineering and others by unpatched vulnerabilities. Yet, with all of these breaches this year and years past, phishing still remained one of the top attack vectors in 2018, and will continue to play a major role in the threat landscape of 2019 and beyond. 

Phishing, along with other social engineering attack vectors, preys on the human element. If 2018 taught us anything, it’s that companies need to use a more proactive approach in order to try to prevent these attacks from happening in the first place. 

This can be made possible by holding the human aspect of security in high regard and ensuring that training and education continue to play a large part in a multi-layered approach to security. 

While social engineering continued to stay on the security radar in 2018, automation and Artificial Intelligence were two topics that truly became popular buzzwords in the industry, and we can expect to see more of these being implemented into security programs going forward.

Although these are both massive technological advancements for the industry, still the human factor remains thus they will need to be used in conjunction with training to help prevent incidents. 

From a security awareness perspective, another growing trend that needs to be addressed going forward is connected devices. We are in an “always-on” culture, surrounded by technology that we enable to make our lives move faster and more efficiently.

However, with this connectedness comes more risks, and these risks are the ones people sometimes don’t even realise exist. If we can educate users on best practices regarding IoT, we can make everyday occurrences that are as simple as their drive to work, their time spent watching television or listening to music via their digital assistants, or even adjusting the temperature in their home ecosystem more safe and secure.  

Just like in 2018, the need for security awareness programs at companies of all sizes will continue to grow in 2019, and the demand to fill these roles will grow as well.

As more attacks continue to happen, additional training around prevention, as well as response, is imperative. Likewise, as the need for training increases, more and more vendors are popping up each day to help fill this security awareness void.

Many of these third-party training and awareness materials can be wonderful supplemental material to a robust and mature security awareness program, but it’s essential that those in the field do diligent research to choose a vendor that is reputable and best meets their company’s needs. 

Security also finally has the ear of the board, and security awareness is a question that is top of mind to most executives. With an extensive amount of cybercrime occurring, more companies are making headlines in a negative light, forcing boards to acknowledge the undesirable recognition a breach can lead to including being front and center in the media which can be damaging to their brand and reputation.

Many of the breaches that occurred during and prior to 2018 could have quite possibly been prevented had a user been given the proper training and tools they needed to be more vigilant. 

There are also additional regulations coming out globally as well as in the US on a state by state basis: these regulations are mandating more restrictions around data privacy and protection of information, thus making the old checkbox approach to security awareness a practice of the past.

All these factors drive the need for security awareness professionals to develop programs that include frequent training and education to keep their companies and their assets secure. 

As an industry, we are continuing to make great strides when it comes to security awareness and education but, unfortunately, the threat actors continue to remain one step ahead. Every aspect of the business needs to be security aware because anyone from the top down, to the bottom up, can become a victim.

In 2019, security teams should empower people to take more control of their own security, not only at work, but at home and not only with themselves, but with their families as well. It is imperative in the coming years that people remain adaptive to the changing events, technologies and threats, and continue to view security awareness and the human factor as a necessary part of any security program.

With this in mind, we as an industry also need to continue to create innovative approaches to engage employees and ensure they are equipped with the knowledge that they need to play an effective role in preventing these attacks in the first place. 

Because after all, you can put all the technology in place but the people will remain a major factor when it comes to securing your company and its assets.

For Cyber staff training please contact us at Cyber Security Intelligence. 

Infosecurity:

You Might Also Read:

Cybersecurity 2019: Predictions You Can’t Ignore!

« US Marines Turn To Artificial Intelligence To Better Deploy Troops
Germany Develops Offensive Cyber Capabilities Without A Coherent Strategy »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Dreamlab Technologies

Dreamlab Technologies

Over the last 20 years, Dreamlab Technologies has established itself as a source of constant innovation within the information security landscape.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

Toothpic

Toothpic

ToothPic has invented, designed, developed and patented a solution to enable companies to turn every smartphone into a secure key for a user-friendly online authentication.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.