The Guide to Creating a Culture of Security
CCB Technology
Award-winning IT support & project services for businesses & nonprofits nationwide.
Your business data has never been more valuable – or vulnerable. The current and constantly changing cyber landscape has caused many businesses to assess their protection strategies, starting with their users. Every day, new security threats are created, putting your critical business data at risk.
The key to creating a lasting culture of security in your business begins with making intentional choices and developing healthy IT security habits.
Your users are your first line of defense to protect against looming threats, but do they know what to look for? Are they equipped with the knowledge to make conscious and intentional decisions to prevent threats?
All it takes is ONE.
ONE email. ONE click. ONE mistake.
And just like that, your entire system, network and business could fall victim to ransomware – giving cybercriminals access to your sensitive data.
Company Security: Perception vs. Reality
There's perception, and then there's reality – which can be a hard pill to swallow for some. Approximately 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyber-attacks. There's a common theme among businesses: anyone outside of IT thinks that security is an IT problem, whereas IT sees it as an "everyone else" problem. The reality is that IT security is everyone's responsibility.
91% of employees understand the risk of reusing passwords, yet 66% admit to doing it anyway.
Each person in your organization plays a critical and equal role in protecting your organization from threats. In order for security procedures to be effective, they require total participation from your users, but that's likely not the case.
It's up to you to provide the right tools, guidance and management, so let’s explore some key areas to help you get started.
Password protection
Reusing passwords – we've all done it at some point, and while it may seem harmless to tack on some extra numbers and characters at the end of a password, it opens a door for hackers to crack multiple accounts at once. Understanding what makes a password insecure is the first step toward creating better password hygiene.
80% of data breaches are linked to passwords – making them your single greatest and most easily targeted vulnerability. Thankfully, it's entirely possible to prevent password compromise. It starts with proper password hygiene and practices.
领英推荐
Here are a few best password practices to implement:
The best defense against password cracking is length.
Following these password guidelines should mean an easier path to better security by making passwords longer, more robust and user-friendly.?
Let’s be real: your business probably cannot afford to have any lapses in productivity and it can be easy to overlook IT security as a possible interruption. In the event of a breach or malware, how long can your business afford to be down? Odds are, not that long without significant financial and operational loss. With this increased need for productivity, employees are looking for ways to work faster and get things done. They might download apps and tools not approved and regulated by your company. Without permissions and regulated password behaviors, it makes it nearly impossible for IT teams to maintain oversight until it's too late.
With remote and hybrid work models still at the forefront of organizations today, we continue to see relaxed and, in some cases, outdated security protocols. Regularly assessing your security strategy will help align your IT with your evolving business needs.
BYOD Policy
BYOD can create potential security risks. Online courses for mobile device workers can help educate employees on how to avoid risks without costly security protocols. When accessing company emails or other business applications, mobile devices should always be password-protected, encrypted, or have biometric authentication in case they're ever lost or stolen.
Understanding the safe use of personal devices should be required for all employees and mandated as a part of new employee onboarding, including having them sign a mobile security policy.
Phishing Awareness
Phishing attacks prey on human nature by offering an incentive - like free stuff, a business opportunity, and then creating a sense of urgency. Use these examples of common phishing emails and tips for identifying attempted attacks in your awareness training program.
Malware
Cybercriminals use malware to steal data or infiltrate an organization's systems with ransomware or wiper malware. It's delivered in various ways, including phishing emails, drive-by downloads, and malicious removable media.
Important points include:
Removable Media
USBs, CDs, and other removable media can be used to allow malware, steal data, install ransomware, or destroy the computer they are on. They can run automatically with Autorun, so be sure it's disabled. Tell employees never to connect removable media to any computer unless the IT team has scanned it first.
Safe Internet Practices
Here are areas to cover regarding safe internet practices that will help prevent attackers from entering your network:
Keeping Security Top of Mind
Regardless of your organization’s size, staying up-to-date on the latest threats and keeping security top of mind is the best way to stay ahead of cybercriminals. It all starts with your end users—they are either your first line of defense or your greatest vulnerability. Although human error can’t be eliminated, it CAN be reduced by arming your users with the right information, training, and awareness needed to identify and prevent cyber attacks.
If you’re helping to manage your organization’s IT security, you should never have to do it alone – you need the support of everyone in your company behind you.
We didn’t cover everything here, but you can read more in our eBook: The Ultimate Guide to Creating a Culture of Security.
Interested in all things IT, AI, and Cybersecurity
3 周Good stuff! Thanks for sharing :-)
Great article! Great information!