Building a Human Firewall

Building a Human Firewall

Network and computer security has evolved, as have the threats. A human firewall is necessary to protect your users and organization from data breaches, identity theft, and costly downtime. Relying on antivirus on every computer as your only security simply doesn’t work. Users are the weakest link to network security. But, with proper training they can become your strongest defense as a human firewall!

A report based on interviews with hackers at the 2016 Black Hat conference found that 81% of hackers are confident they can get access to your data within 12 hours. Over 75% of the report respondents study security and technology news at least 1-10 hours a week. Over 50% of these same folks stated that employee education was an “extremely important countermeasure”. If your team isn’t being educated and you don’t have a trusted Managed Security Services partner keeping eyes on things, it’s safe to say someone else’s eyes are, or easily can be, on your data.

Baseline Testing

Most firms, especially small businesses, have no formal process in place to test staff knowledge of security threats. They don’t monitor threats coming into the network from email, website browsing, and more.

In February of 2017 Google released findings from analyzing over a billion emails. Business email receives 6.2X the amount of phishing attacks, 4.3X more malware, and 0.4X more spam than personal email accounts. Seeing as a lot of staff use their work email as their personal email, it’s safe to say this is a huge threat.

Baseline testing addresses this by sending mock threats and attacks to users and tracking how they respond. For example, simulated phishing attacks will email users with “free pizza” and “IRS tax credit” offers they can click over to and/or download forms for. At BCC we also do USB drop tests by placing trackable USB thumb drives with files that report back home when opened throughout the office.

All user responses (or non-responses) are tracked and recorded to discuss who might need more extensive training. Post training, another test is run to confirm the effectiveness of your new human firewall.

Initial and On Demand Training

After seeing the results of a baseline test, most firms quickly see the reason why they need to train users and the potential value. In person training should be completed but on demand solutions are also needed.

For example, a video training library can be made available. We recommend chopped up clips and videos containing small topics that can be quickly consumed on the go, or as needed. If a user hears about Ransomware in the news, they should be able to quickly pull up info on it from this reliable source.

A well trained soldier will always be much more effective as part of your human firewall.

Ongoing Education

As mentioned earlier, threats are always evolving. Users need to be informed of new threats and human engineering schemes as they come to light and start spreading. A knowledgeable contact within your organization (or your trusted IT partner) should provide regular communication on these items.

At Blue Collar Computing we send out monthly newsletters with the latest threats and simple user tips to our Managed Security Services clients. Our on-demand training library is also regularly updated.

Proactive Threat Tracking

User education is only one half of the equation, unfortunately. Having a knowledgeable staff gives you the human firewall that complements your network firewalls and systems. Antivirus, proper patching, and network access control are still important. Furthermore, we recommend going the extra step and having an advanced, unified threat management (UTM) and SIEM in place.

If you have a Managed Security Services partner you’ll want to make sure they’re using advanced heuristics to track potential attacks. They should be spotting attack patterns from the outside as well as detecting network traffic that looks like a compromise or data leak on the inside. We combine the end user training with advanced threat detection and incident response at BCC. It’s a must have for industries needing compliance.


If your firm needs a partner to help build out your human firewall, give us a call or send us an email at Blue Collar Computing. I personally love talking about security and training users!

要查看或添加评论,请登录

Arthur Dodd的更多文章

  • Surface Pro New Features for Business

    Surface Pro New Features for Business

    Microsoft unveiled the Surface Pro in Shanghai. We were quick to ask for a list of the Surface Pro new features for…

  • Alexa for Business

    Alexa for Business

    We’re living in the AI world. While most of the benefits of AI are handled behind the scenes, virtual and digital…

  • Google Takes on Office365 with G Suite

    Google Takes on Office365 with G Suite

    With the new rebrand of Google Apps, it’s clear that Google is taking on Microsoft and Office365 with G Suite…

  • Office Move Must Dos for IT

    Office Move Must Dos for IT

    While it’s never fun to move offices, having a plan can make sure things go as fast and smooth as possible. Each Summer…

  • Do Backups Matter with Cloud Technology?

    Do Backups Matter with Cloud Technology?

    Many small businesses are moving to cloud based solutions and for great reasons. There are great cost savings, faster…

  • 6 Dinosaur Tech Items Your Business Must Replace

    6 Dinosaur Tech Items Your Business Must Replace

    One battle cry I hear from almost every business we walk through the door to help is, “if it’s not broke, why fix it?”…

  • 8 Features Announced at Apple WWDC 2016

    8 Features Announced at Apple WWDC 2016

    Apple’s annual developer conference (WWDC) was June 13-17 of this year. This is the time of year all of the upcoming…

  • 9 Reasons to Try Bullet Journaling

    9 Reasons to Try Bullet Journaling

    Tech is my job, life, and passion. That being said, it is not always the best answer for productivity.

    3 条评论
  • Securing Data While Traveling

    Securing Data While Traveling

    Recently Apple and the US government had a very public showdown over hacking an iPhone for a legal case. This brought a…

  • Big Data, Small Business

    Big Data, Small Business

    Big Data, Small Business This steam roller is not stopping. Jump and get on board now or big data is going to flatten…

社区洞察

其他会员也浏览了