Why An Effective Security Culture Is Essential For Your Organisation

With data breaches spiralling out of control, it’s time that organisations change their approach to fighting information security threats.

There’s a long-held, mistaken belief that this is an IT issue that can be fixed with more reliable software and a keener eye on technological flaws. In reality, employees are just as likely to cause a data breach as a bug in your system, and unfortunately there’s no simple patch for human error.

Rather, it takes an organisation-wide commitment to security, as you educate staff on the risks they introduce to your business and get them to break bad habits.

The problem with staff awareness training
When experts talk about educating employees, they generally refer to staff awareness training. In most organisations, this takes the form of online or in-person courses that take place once a year. More vigilant organisations might run two or three a year, but they’re nonetheless rarities – distractions from your everyday work – rather than part of an ongoing, structured approach to cyber security.

It’s not hard to see why employees might resent these courses. They interrupt their working week and knock them off schedule, and tend to comprise being lectured on how to do seemingly simple tasks, like sending emails or creating passwords.

This is why staff training alone can only do so much. Sure, employees will retain some of what they’ve been told, but true progress takes a willingness to learn.

That means building a culture of cyber security in which organisations take the time to show staff the real-world consequences of poor data protection practices.

It’s one thing to give them a PowerPoint presentation with stats like “23 million people in the UK use ‘123456’ as their password”, but it’s something else to explain why that’s a bad thing. The answer might sound obvious, but you’d be surprised at how often there are knowledge gaps between the errors that cause data breaches and the advice for preventing them. 

Let’s take a look at some examples.

Where employees are going wrong
Employees are generally aware that passwords should be a combination of at least eight letters, numerals and special characters (although there are arguably better ways of creating strong passwords), but that doesn’t really cut to the issue.
As a result, employees might create passwords such as ‘Password#1’. It meets all the criteria, but it’s not going to protect your account – being, as it is, a minor variation on one of the most popular login credentials.

The same thing applies to phishing emails. You can warn staff all you like to look out for suspicious messages and unsolicited, urgent requests, but the scams are successful not necessarily because victims are ignorant but because they’re careless.
Victims of phishing emails are, in many cases, aware of the threat of these scams but were caught out in the heat of the moment.

That’s exactly why phishing is so dangerous: the seemingly urgent nature of the messages can make us ignore any faint alarm bells that ring as we dimly recall a warning from a training session we once took.

The only way to tackle people’s impulse to click phishing emails is to engrain good habits into them. Employees should be capable of immediately recognising suspicious emails in the same way that they should intuitively know what makes a strong password.

Because contrary to a lot of evidence, staff awareness training doesn’t have to be complicated. The only thing that’s lacking is the time and commitment towards rooting out bad habits.

Creating a culture of cyber security
Developing a culture of cyber security is as simple as making staff awareness part of your day-to-day operations.
Training courses should remain the backbone of your efforts, and e-learning is an ideal way of delivering lessons. It’s affordable, staff can take the course at a time that suits them and it gives you a reliable audit trail. That means you can see who has taken the course and, just as importantly, who hasn’t.

You should complement training with visual reminders that enforce these lessons, like posters and email signatures containing security advice.

Perhaps the most important thing you can do is to practise ‘nudge theory’. This is a type of behavioural science that prompts individuals to make smart decisions by using indirect suggestion and positive reinforcement.
The approach is intended to help employees rationalise why certain processes are necessary, meaning they’re making smart choices by habit rather than from memory.

Subtle things like these might not seem as though they’ll make a huge difference, but remember: the devil is in the detail.
Just as you break bad habits in your personal life through small, routine gestures and reminders of your bad ways rather than one grand statement, so too does effective data protection require regular nudging. 

So don’t leave your organisation’s information security wellbeing to your IT department or staff awareness training providers. Make it a part of your day-to-day activities and encourage everyone to play their part.

About The Author: Luke Irwin
Luke Irwin is a writer for IT Governance. He provides news and opinions on a variety of information security topics, and was nominated for the 2019 European Cybersecurity Blogger Awards.

 

 

 

« New York’s Albany Airport Pays Ransom
5G Will Reduce Car Accidents »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

macmon secure

macmon secure

macmon secure develops network security software, focussing on Network Access Control.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

Defend-OT

Defend-OT

Defend-OT is a Belgium-based cybersecurity firm specializing in OT environments.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.