How to talk security so people will listen (and comply!)
From phishing your own employees to sharing your company's hack history, here are five techniques for getting users' attention about security.
Computerworld - The statistics are staggering: Last year, Symantec blocked a total of over 5.5 billion malware attacks, an 81% increase over 2010, and reported a 35% increase in Web-based attacks and a 41% increase in new variants of malware.
If those findings, documented in the company's latest annual Internet Security Threat Report, cause IT leaders to wonder if they've done everything possible to protect their companies, they might consider looking in the mirror.
That's because security folks, in struggling to establish policies and procedures that are both effective and easy to use, often forget a third and crucial step, experts say: Communicating their security goals in such a way that the broad corporate population not only understands but responds.
"Compliance is necessary, but it's not sufficient," says Malcolm Harkins, vice president and chief information security officer at Intel.
Harkins' goal is to get employees to go beyond compliance toward full commitment to protecting the company's information. "If they're committed to doing the right thing and protecting the company, and if they're provided with the right information, [then] they'll make reasonable risk decisions."
To be sure, employees are not involved in every type of corporate security breach (see Top 10 threat action types), but user behavior and non-compliance are implicated in many, including mobile malware, social network schemes and advanced target attacks. These are increasingly aimed not at CEOs and senior staffers, but at people in other job functions such as sales, HR, administration and media/public relations, as criminals try for "lower-hanging fruit," the Symantec report says.
Against such an onslaught, the stereotypical wall poster of security tips hanging in the breakroom is useless, says Julie Peeler, foundation director at the International Information Systems Security Certification Consortium -- also known as (ISC)² -- a global, non-profit organization that educates and certifies information security professionals. "Security training is not a one-time event. It has to be integrated throughout the entire organization, and it has to come from the top," she says.
When it comes to talking security in a way that users will listen, managers need to ensure that employees understand the security posture of the company from day one, Peeler says. They must be willing to sign confidentiality agreements, attend training and participate in ongoing awareness, all with the goal of remaining vigilant.
Top 10 threat actions used against larger enterprises
(by percent of breaches affected)
|1||Use of stolen login credentials||Hacking||30%|
|2||Backdoor (allows remote access/control)||Malware||18%|
|3||Exploitation of backdoor or command and control channel||Hacking||17%|
|6||Pretexting (classic social engineering)||Social||12%|
|7||Brute force and dictionary attacks||Hacking||8%|
|9||Phishing (or any type of "ishing")||Social||8%|
|10||Command and control (listens for and executes commands)||Malware||8%|
- CIOs Deliver Productivity Breakthroughs with Intelligent Digital Signage Retailers have long recognized the influence that digital signage provides over a shopper's point-of-purchase decision making process.
- Ponemon 2014 SSH Security Vulnerability Report According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations...
- QA Automation: Reducing Test Execution While Improving Coverage A leading capital investment firm in the US was in need of a comprehensive, cost effective and flexible solution to reduce their existing...
- Learn why Analyst firm Ovum names SugarCRM a leading CRM Recommendations for Enterprises. View Now>>
- On-demand webinar - 7 Keys to Service Catalog Implementation Success Watch this webinar to learn 7 crucial keys to make your service catalog a success!
- Top 4 Digital Signage Fails Join RMG Networks for a look at four of the most common reasons digital signage fails in corporate businesses. Learn about strategies to... All Consumerization of IT White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!