Cyberthreats to your business are usually blamed on outsiders—nefarious programmers writing malicious code designed to pilfer your corporate intelligence, siphon your confidential customer information, and/or raid your financial data. Sometimes, the threat actually originates from within, when employees’ ignorance and/or negligence opens the door for cybercriminals.
This eBook is designed to provide you with tips for educating your employees about cybersecurity. It’s important to train employees before you have a data breach. Don’t wait to react. Create policies that assume you’ll be infiltrated, and then help employees learn what they should do (and not do) to keep your business safe.
REGULARLY TALK TO EMPLOYEES ABOUT CYBERSECURITY
Explain the potential impact a cyber incident may have on your organization’s operations, and spell out employee obligations, particularly with the use of a mobile phones.
• It’s not enough to require an annual review and signing of an “I have read and understand company IT policies.”
REMEMBER THAT TOP MANAGEMENT AND IT STAFF ARE EMPLOYEES, TOO!
Top managers are often targeted because
They have access to more information. The bad guys recently targeted traveling executives using free hotel Wi-Fi without encryption.
IT bends the rules for them.
The damage/financial payoff can be much bigger.
With their unlimited power over the network, IT folks are also vulnerable.
EXPLAIN TO THE EMPLOYEES THAT, WHILE YOU MAKE THE BEST EFFORT TO SECURE THE COMPANY’S INFRASTRUCTURE, A SYSTEM IS ONLY AS SECURE AS THE WEAKEST LINK
Encourage cooperation, not just compliance.
Create a policy sophisticated enough to cover all possible attack vectors.
Recognize that humans have weaknesses and make mistakes
HAVE REGULAR, FOCUSED SESSIONS WITH EMPLOYEES TO EXPLORE DIFFERENT TYPES OF CYBERATTACKS.
Since new employees start work all the time, cybersecurity training should be part of your general onboarding activities.
Consider different formats (e.g., Lunch & Learn).
Make it useful. — Most employees have PCs at home and relatives who also need help.
Make it useful: Reference topical news stories. and Use social media.
WARN EMPLOYEES TO PAY SPECIAL ATTENTION TO SOCIAL ENGINEERING ACTIVITIES.
Beware of social media, blogs, and suspicious links from unknown sources while at work or using corporate devices.
Many cyber incidents begin with a phone call from someone posing as a co-worker asking seemingly innocuous questions, gathering information about the company and its operations.
A cybercriminal exploiting social weaknesses almost never looks like one.
TRAIN EMPLOYEES TO RECOGNIZE AN ATTACK.
Have policies in place that assume you’ll be infiltrated. Don’t wait to react. Have a documented remediation plan in place and update or review frequently.
Communicate step-by-step instructions about what to do if employees believe witnessed a cyber incident.
Training needs to happen before there’s a problem.
Trainings should include specific rules for email, Web browsing, mobile devices and social networks
Don’t forget to include the basics:
Physically unplug your machine from the network.
Notify your administrator of any suspicious emails, unusual activity or if you lose your mobile device.
If you can’t find your emergency IT number in 20 seconds or less, start memorizing!
NEVER DISAPPROVE OR MAKE FUN OF AN EMPLOYEE WHO RAISES A RED FLAG.
Even if it’s a false alarm, it’s important not to discourage employees for speaking up in case a real cyberattack happens.
If false alarms happen regularly, improve your training approach.
IF AN INCIDENT HAPPENS, GIVE YOUR EMPLOYEES A HEADS-UP AS SOON AS POSSIBLE.
A lack of transparency or improper handling of a cyberincident may significantly increase the impact of the event.
Issue instructions about how to speak to the public and the press about the incident.
Have an internal communications plan and PR strategy in place before anything happens.
Consider insurance for cyber incidents.
REGULARLY TEST EMPLOYEES CYBERSECURITY KNOWLEDGE.
Make it relevant for their digital lives.
Make it fun or rewarding (or fun and rewarding) with incentives for prompt responses.
INVITE, LISTEN AND RESPOND TO FEEDBACK.
If you force employees to change passwords every week, be prepared that they will write them down and post them in their workspaces.
If it’s too difficult or complicated to access something they need to do their jobs, they will find less secure work-arounds like using personal email, USB sticks and using colleagues to bypass restrictions.
Learn the root cause of unsafe behavior