Educating Employees About Top 10 Tips on Cyber Security
Cyberthreats to your business are usually blamed on outsiders—nefarious programmers writing malicious code designed to pilfer your corporate intelligence, siphon your confidential customer information and/or raid your financial data. Sometimes, the threat actually originates from within, when employees’ ignorance and/or negligence opens the door for cybercriminals. This eBook is designed to provide you with tips for educating your employees about cybersecurity. It’s important to train employees before you have a data breach. Don’t wait to react. Create policies that assume you’ll be infiltrated, and then help employees learn what they should do (and not do) to keep your business safe.
Regularly talk to employees about Cyber Security.
- Explain the potential impact a cyberincident may have on your organization’s operations, and spell out employee obligations, particularly with the use of mobile phones.
- It’s not enough to require an annual review and signing of an “I have read and understand company IT policies.”
Remember that top management and its staff are employees too
Top managers are often targeted because:
- They have access to more information. The bad guys
recently targeted traveling executives using free hotel Wi-Fi without encryption.
- IT bends the rules for them.
- The damage/financial payoff can be much bigger.
With their unlimited power over the network, IT folks are also vulnerable.
Explain to the employees that while you make the best effort to secure the company's infrastructure, a system is only as secure as the weakest link
Encourage cooperation, not just compliance.
- Create a policy sophisticated enough to cover all possible attack vectors.
- Recognize that humans have weaknesses and make mistakes.
Have regular, focused sessions with employees to explore different types of Cyber attacks
- Since new employees start work all the time, cybersecurity training should be part of your general on-boarding activities.
- Consider different formats (e.g., Lunch & Learn).
- Make it useful.
– Most employees have PCs at home and relatives who also need help.
– Reference topical news stories.
– Use social media.
Warn employees to pay special attention to social engineering activities
Beware of social media, blog and suspicious links from unknown sources
while at work or using corporate devices.
- Many cyberincidents begin with a phone call from someone posing as a co-worker asking seemingly innocuous questions, gathering information about the company and its operations.
- A cybercriminal exploiting social weaknesses almost never looks like one.
Train employees to recongnize an attack
- Have policies in place that assume you’ll be infiltrated. Don’t wait to react. Have a documented remediation plan in place and update or review frequently.
- Communicate step-by-step instructions about what to do if employees believe witnessed a cyberincident.
- Training needs to happen before there’s a problem. Trainings should include specific rules for email, Web browsing, mobile devices and social networks.
Don’t forget to include the basics:
- Physically unplug your machine from the network.
- Notify your administrator of any suspicious emails, unusual activity or if you lose your mobile device.
- If you can’t find your emergency IT number in 20 seconds or less, start memorizing!
Never disapprove or make fun of an employee who raises a red flag
- Even if it’s a false alarm, it’s important not to discourage employees forspeaking up in case a real cyberattack happens.
- If false alarms happen regularly, improve your training approach.
If an incident happens, give your employees a heads-up as soon as possible
- A lack of transparency or improper handling of a cyberincident may
significantly increase the impact of the event.
- Issue instructions about how to speak to the public and the press about theincident.
- Have an internal communications plan and PR strategy in place beforeanything happens.
- Consider insurance for cyber incidents.
Regularly test employees cyber security knowledge
- Make it relevant for their digital lives.
- Make it fun or rewarding (or fun and rewarding) with incentives forprompt responses.
Invite, listen and respond to feedback
- If you force employees to change passwords every week, be prepared that they will write them down and post them in their workspaces.
- If it’s too difficult or complicated to access something they need to do their jobs, they will find less secure work-arounds like using personal email, USB sticks and using colleagues to bypass restrictions.
- Learn the root cause of unsafe behavior.