Failing Safe in Cyber Security: Empowering Users to Navigate Safely in a Perilous Digital Landscape

Failing Safe in Cyber Security: Empowering Users to Navigate Safely in a Perilous Digital Landscape

Introduction

In the realm of cyber security, "failing safe" refers to the concept that users can make mistakes without causing significant damage to the organization. In this ever-evolving threat landscape, it is crucial to focus not just on technology and processes but also on the human element. This article will delve into user behavior, the psychology behind successful cyber attacks, and the importance of creating a fail-safe environment for users. We will critically analyze the counterintuitive nature of cyber security controls, explore innovative approaches to make cyber security more accessible to the masses, and provide recommendations for creating an effective fail-safe environment.

User Behaviour and the Psychology of Cyber Attacks

Understanding user behaviour is essential in creating a fail-safe environment for organizations. Human error is one of the leading causes of security incidents, often because users are unaware of the risks associated with their actions [1]. The psychology behind successful cyber attacks can be attributed to several factors, including cognitive biases, social engineering techniques, and the inherent trust users place in technology [2].

Cognitive biases, such as confirmation bias and anchoring, can lead users to make erroneous decisions in the face of phishing attacks and other cyber threats [3]. Social engineering techniques exploit users' trust and emotions, manipulating them into disclosing sensitive information or engaging in unsafe practices [4]. Additionally, users' inherent trust in technology can make them more susceptible to cyber attacks, as they may assume that security measures are already in place to protect them [5].

Current and Future Controls for Failing Safe

In order to create a fail-safe environment, organizations need to implement a combination of technical, procedural, and educational controls that address both current and future threats. These controls should aim to:

1. Provide robust email security measures, such as advanced threat protection and phishing detection, to prevent malicious emails from reaching users [6].You can't remove all threats, but having lesser threats go through is better than none.?

2. Implement strict access controls and multi-factor authentication to minimize the risk of unauthorized access and data breaches [7]. Move beyond password based authentication to a more resilient authentication method (while same may even claim to be phish proof) should already be in your roadmap. Challenge will be to get legacy applications on board, and where some touts the advent of Zero Trust.

3. Employ comprehensive endpoint security solutions, including antivirus, anti-malware, and intrusion prevention systems, to protect users' devices from threats [8]. Think of it as first line of defense when something unwanted enters your environment and it gets mitigated first.?The world has moved from antivirus, to endpoint protection and now EDR.

4. Establish a security-aware culture by providing regular training, awareness programs, and reinforcement of security policies [9]. Try doing positive reinforcement (carrot based approach) rather than negative reinforcement (stick based approach). Make security training fun and not punishable by policy. That removes the stigma of awareness being "another stuff you got to get done!".

5. Adopt a zero-trust security model, which assumes that no user or device is inherently trustworthy and requires verification for all access requests [10].

The Counterintuitive Nature of Cyber Security Controls

Cyber security controls can sometimes be counterintuitive, as they often conflict with users' natural behaviors and expectations. For example, the internet is built on the concept of hypertext, which encourages users to click on links and explore new content [11]. However, in the context of cyber security, clicking on unknown links can be dangerous and lead to phishing attacks or malware infections. Imagine undoing years of learning how to use Internet!

To address this challenge, organizations should focus on designing cyber security controls that are user-friendly and align with users' natural instincts. This can be achieved by:

1. Simplifying security protocols and making them more intuitive, such as using password managers to help users create and manage complex passwords [12].

2. Incorporating visual cues and clear messaging in phishing simulations and other security training materials to help users identify threats [13].

3. Employing adaptive security solutions that learn from users' behaviours and adjust accordingly to provide personalized protection [14].

4. Making it mundane and boring is a sure fire way to demotivate people from becoming aware.

Everyone does security awareness. Everyone kinda knowns what they should do. But then they still fail. Why??

Reaching the Masses: Beyond Awareness

While security awareness programs are essential, they are not the sole solution to creating a fail-safe environment. Organizations must explore other creative and intuitive ways to bring cyber security to the masses, such as:

1. Gamification: Leveraging game mechanics and rewards to motivate users to adopt secure behaviours and complete security training [15].

2. Nudging: Implementing subtle reminders and prompts in users' daily workflow to encourage secure practices, such as password changes and software updates [16].

3. Social Influence: Encouraging secure behaviour through peer-to-peer learning and positive reinforcement, creating a sense of shared responsibility for cyber security within the organization [17].

4. Human-Centered Design: Developing security solutions and policies with users' needs and preferences in mind, making it easier for them to follow best practices and avoid mistakes [18].

5. Security by Design: Integrating security measures into the development process of new products and services, ensuring that security is a fundamental aspect of their design and not an afterthought [19]. Secure by default makes it much harder for average user to make mistakes. Be it in desktop/laptop environment to server/cloud infrastructure.

Conclusion

Failing safe in cyber security is a critical aspect of protecting organizations from the multitude of threats they face today. By understanding user behavior, addressing the counterintuitive nature of cyber security controls, and exploring creative ways to reach the masses, organizations can create an environment in which users can navigate the digital landscape safely and confidently. The future of cyber security lies in embracing a human-centric approach that empowers users to make informed decisions, reducing the risks associated with human error and contributing to a more secure digital world for all.

References:

[1] IBM Security. (n.d.). IBM X-Force Threat Intelligence. Retrieved from https://www.ibm.com/security/data-breach/threat-intelligence

[2] Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24(2), 124-133. Retrieved from https://www.sciencedirect.com/science/article/pii/S0268401217302812

[3] Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49(3-4), 190-198. Retrieved from https://www.sciencedirect.com/science/article/pii/S0022103112000722

[4] Hadnagy, C., & Fincher, M. (2017). Social Engineering Attacks and Countermeasures in Today's Organizations. In Corporate Security Crossroads (pp. 69-96). CRC Press. Retrieved from https://www.researchgate.net/publication/321252807_Social_Engineering_Attacks_and_Countermeasures_in_Today's_Organizations

[5] Wang, W., & Guo, Y. (2020). An empirical study of factors affecting users' information security behavior. IEEE Access, 8, 11260-11267. Retrieved from https://ieeexplore.ieee.org/document/8953373

[6] Microsoft Security. (2020, April 16). Secure the modern workplace with Microsoft 365 advanced security capabilities. Retrieved from https://www.microsoft.com/security/blog/2020/04/16/secure-modern-workplace-email-protection/

[7] Cisco Systems. (n.d.). Cisco Identity Services Engine (ISE). Retrieved from https://www.cisco.com/c/en/us/products/security/identity-services-engine/index.html

[8] Symantec. (n.d.). Endpoint Security. Retrieved from https://www.symantec.com/products/endpoint-security

[9] National Institute of Standards and Technology. (n.d.). Security Awareness. Retrieved from https://www.nist.gov/cyberframework/online-learning/security-awareness

[10] Lemos, R. (2018, January 22). What is zero trust? A model for more effective security. CSO Online. Retrieved from https://www.csoonline.com/article/3247848/what-is-zero-trust-a-model-for-more-effective-security.html

[11] Berners-Lee, T. (n.d.). Design Issues for the World Wide Web. Retrieved from https://www.w3.org/DesignIssues/Principles.html

[12] LastPass. (n.d.). LastPass Password Manager. Retrieved from https://www.lastpass.com/password-manager

[13] KnowBe4. (n.d.). Phishing Security Test. Retrieved from https://www.knowbe4.com/resources/phishing-security-test

[14] Chuvakin, A. (2015, November 30). Adaptive Security Architecture: Protecting the Evolving Enterprise. Dark Reading. Retrieved from https://www.darkreading.com/vulnerabilities---threats/adaptive-security-architecture-protecting-the-evolving-enterprise/a/d-id/1323723

[15] SANS Institute. (2019, October). Security Awareness Summit 2019. Retrieved from https://www.sans.org/security-awareness-training/summits/2019/10/gamification-summit

[16] Anderson, B. B., Jenkins, J. L., & Vance, A. (2016). From beliefs to outcomes: The effect of information system personnel's security awareness on secure behavior. Information & Management, 53(5), 583-595. Retrieved from https://www.sciencedirect.com/science/article/pii/S0378720615000765

[17] Kaur, P., Mustafa, N., & Dutta, A. (2018). A comprehensive study of security awareness among computer users. International Journal of Computer Applications, 181(33), 12-18. Retrieved from https://www.ijcaonline.org/archives/volume181/number33/30268-2018917783

[18] Warkentin, M., Johnston, A. C., & Shropshire, J. (2011). The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. European Journal of Information Systems, 20(3), 267-284. Retrieved from https://www.tandfonline.com/doi/abs/10.1057/ejis.2011.4

Robin Yong

#LobinKor | Favikon #2 CyberSecurity Malaysia, #87 LinkedIn Malaysia | IT & Cyber GRC Across 3 Lines of Defense

1 年

As usual another quality sharing, thank you Ts. Dr. Suresh Ramasamy CISSP,CISM,GCTI,GNFA,GCDA,CIPM for the insightful sharing. This sharing give me a new dimension of end user angle to think about.

回复

要查看或添加评论,请登录

Ts. Dr. Suresh Ramasamy CISSP,CISM,GCTI,GNFA,GCDA,CIPM的更多文章

  • Is digitalisation lost?

    Is digitalisation lost?

    Whether you're at a CxO seminar or speaking to CIO/CTO/CDO, you'll find digitalization being a key focus, in fact KPI…

  • Holidays and BYOE

    Holidays and BYOE

    This was an article I wanted to write last year while on vacation, but unfortunately got delayed and I forgot about it!…

  • 2024 - wrapped up

    2024 - wrapped up

    This is what I have produced for everyone's consumption this year. There is a bet below at the next section.

    3 条评论
  • Is CyberSecurity supposed to be expensive?

    Is CyberSecurity supposed to be expensive?

    Credits – This article is the result of an adhoc discussion between Vinod Ramachandran , Sivanathan Subramaniam and…

    1 条评论
  • Handling passwords in 2024 and beyond - NIST approach

    Handling passwords in 2024 and beyond - NIST approach

    Note: I previously wrote about passwords and how some changes in the industry had occured here -…

  • Addendum 1 - Lebanon Attack Case Study

    Addendum 1 - Lebanon Attack Case Study

    NOTE: This article is a continuation of Case Study on the Lebanon Pager Attack Today, I decided to continue on the case…

  • Case Study - Lebanon Pager attack

    Case Study - Lebanon Pager attack

    Trigger Warning: Explosive and Casualties Shocking news came out of Lebanon on reports of people experiencing explosion…

    7 条评论
  • Malaysian Internet - Issue of DNS Blocking

    Malaysian Internet - Issue of DNS Blocking

    Note; The author (me) was the person (for the longest time, since the beginning of DNS blocking in Malaysia) was the…

    9 条评论
  • Managing Professional Relationships - Bank Balance Approach

    Managing Professional Relationships - Bank Balance Approach

    In the previous article, we looked at how relationships can be categorised, taking clue from nature. in this article…

  • Human Relationships - Part 1

    Human Relationships - Part 1

    This set of article is a break from my usual cyber security based contents. I decided to write on this topic, observing…

社区洞察

其他会员也浏览了