Security Nudges - USB Security

Security Nudges - USB Security

You may recall from my previous posts here and here that, as part of Thales Australia/New Zealand’s Internal Information Value campaign, I’ve been using ‘security nudges‘ to help influence our employees’ behaviours with regard to information security.

For the latest campaign activity I decided to focus on USB security. To ensure the security nudges would continue to be effective, I chose to rely on the theory of reciprocity to change it up. So, we supplied all employees with a USB data blocker to protect their personal devices, which linked to a backing card with a message relaying the behaviour I wished to address for the company.

USB Security Card Front View
USB Security Card Back View

Before providing the above data blockers, messaging was sent out to all employees that touched on three aspects of USB Security:

  1. The risk of plugging their personal devices into unsecured power charging kiosks, or other people’s computers.
  2. The risk of plugging unknown USB devices into company system’s without first validating that the USB’s didn’t contain malware (especially non-enterprise production support systems)
  3. To consider the Five Information Values before storing sensitive information on unprotected USB’s.



Nicely done Ben. Appropriate given the latest round of HW compromises cropping up. And also thanks for the data blockers - very useful!

Steve Honiss

Executive Director at Bastion Security Group | Board Member at Netsafe New Zealand

5 年

Nice article Ben, I like the "nudge" concept! Q: where did you get the blockers from? I've been meaning to get some for our customers.

Derek Milton

ILS/RAM/Support Systems Engineering Manager and SME at Lockheed Martin Australia Pty Ltd and Proud ADF Vetran

5 年

Great initiative Ben!

要查看或添加评论,请登录

Ben Doyle的更多文章

  • Getting/Arriving to what matters most

    Getting/Arriving to what matters most

    It has been a fantastic journey and a privilege to hold such a unique CISO role for Australia for so long. In my tenure…

    193 条评论
  • Detecting Benign URLs

    Detecting Benign URLs

    I have had the pleasure of working for the last couple of years with a University of Sydney PHD researcher, Fariza…

    4 条评论
  • 20-Year Anniversary in Role

    20-Year Anniversary in Role

    CISO Thales Australia and New Zealand Today marks my official 20-year anniversary working as the Chief Information…

    107 条评论
  • AISA/RSAC CISO Boot Camp

    AISA/RSAC CISO Boot Camp

    Over the last few months, I have been working with Britta Glade from RSA Conference on building the agenda for the…

    8 条评论
  • Purposeful Language

    Purposeful Language

    One of the biggest barriers for cyber professionals when explaining the threat landscape, the controls that are…

    10 条评论
  • Create Memorable Interviews

    Create Memorable Interviews

    This is a continuation in the series of articles I have been writing on LinkedIn on the topic of approaching cyber…

  • Defining the Requirements for a Job

    Defining the Requirements for a Job

    This is a continuation in the series of articles I have been writing on LinkedIn on the topic of approaching cyber…

    5 条评论
  • Be Purposeful in your Job Needs

    Be Purposeful in your Job Needs

    I am a strong believer in the axiom, the value you get out of something is correlated with the effort that you are…

  • Job Focus vs Career Focus Hiring?

    Job Focus vs Career Focus Hiring?

    There is plenty of discussion across the Cyber security industry about the lack of available candidates for Cyber…

    1 条评论
  • Why Cyber Risk is Broken

    Why Cyber Risk is Broken

    Image if you will that you are the owner of a very successful Michelin-star restaurant. The more you put yourself in…

    18 条评论

社区洞察

其他会员也浏览了