Top 10 Tips for Cybersecurity

INSIDE THREATS

Cyberthreats to your business are usually blamed on outsiders—nefarious

programmers writing malicious code designed to pilfer your corporate

intelligence, siphon your confidential customer information and/or raid your

financial data. Sometimes, the threat actually originates from within, when

employees’ ignorance and/or negligence opens the door for cybercriminals.

This eBook is designed to provide you with tips for educating your employees

about cybersecurity. It’s important to train employees before you have a data

breach. Don’t wait to react. Create policies that assume you’ll be infiltrated,

and then help employees learn what they should do (and not do) to keep your

business safe.

TIP 1       REGULARLY TALK TO EMPLOYEES ABOUT CYBERSECURITY.

? Explain the potential impact a cyberincident may have on your organization’s

operations, and spell out employee obligations, particularly with the use of

mobile phones.

? It’s not enough to require an annual review and signing of an “I have read and

understand company IT policies.”

TIP 2       REMEMBER THAT TOP MANAGEMENT AND IT

STAFF ARE EMPLOYEES, TOO!

? Top managers are often targeted because:

— They have access to more information. The bad guys recently targeted

traveling executives using free hotel Wi-Fi without encryption.

— IT bends the rules for them.

— The damage/financial payoff can be much bigger.

? With their unlimited power over the network, IT folks are also vulnerable.

TIP 3      EXPLAIN TO THE EMPLOYEES THAT, WHILE YOU MAKE THE BEST EFFORT TO SECURE THE COMPANY’S INFRASTRUCTURE, A SYSTEM IS ONLY AS SECURE AS THE WEAKEST LINK.

? Encourage cooperation, not just compliance.

? Create a policy sophisticated enough to cover all possible attack vectors.

? Recognize that humans have weaknesses and make mistakes.

TIP 4      HAVE REGULAR, FOCUSED SESSIONS WITH EMPLOYEES TO EXPLORE DIFFERENT TYPES OF CYBERATTACKS.

? Since new employees start work all the time, cybersecurity training should be

part of your general onboarding activities.

? Consider different formats (e.g., Lunch & Learn).

? Make it useful.

— Most employees have PCs at home and relatives who also need help.

? Make it useful.

— Reference topical news stories.

— Use social media.

TIP 5       WARN EMPLOYEES TO PAY SPECIAL ATTENTION TO SOCIAL ENGINEERING ACTIVITIES.

? Beware of social media, blog and suspicious links from unknown sources

while at work or using corporate devices.

? Many cyberincidents begin with a phone call from someone posing as a

co-worker asking seemingly innocuous questions, gathering information

about the company and its operations.

? A cybercriminal exploiting social weaknesses almost never looks like one.

TIP 6       TRAIN EMPLOYEES TO RECOGNIZE AN ATTACK.

? Have policies in place that assume you’ll be infiltrated. Don’t wait to react.

Have a documented remediation plan in place and update or review

frequently.

? Communicate step-by-step instructions about what to do if employees

believe witnessed a cyberincident.

? Training needs to happen before there’s a problem.

Trainings should include specific rules for email, Web

browsing, mobile devices and social networks.

Don’t forget to include the basics:

? Physically unplug your machine from the network.

? Notify your administrator of any suspicious emails, unusual activity or if you

lose your mobile device.

? If you can’t find your emergency IT number in 20 seconds or less, start

memorizing!

TIP 7       NEVER DISAPPROVE OR MAKE FUN OF AN EMPLOYEE WHO RAISES A RED FLAG.

? Even if it’s a false alarm, it’s important not to discourage employees for

speaking up in case a real cyberattack happens.

? If false alarms happen regularly, improve your training approach.

TIP 8       IF AN INCIDENT HAPPENS, GIVE YOUR EMPLOYEES A HEADS-UP AS SOON AS POSSIBLE.

? A lack of transparency or improper handling of a cyberincident may

significantly increase the impact of the event.

? Issue instructions about how to speak to the public and the press about the

incident.

? Have an internal communications plan and PR strategy in place before

anything happens.

? Consider insurance for cyberincidents.

TIP 9       REGULARLY TEST EMPLOYEES CYBERSECURITY KNOWLEDGE.

? Make it relevant for their digital lives.

? Make it fun or rewarding (or fun and rewarding) with incentives for

prompt responses.

TIP 10     INVITE, LISTEN AND RESPOND TO FEEDBACK.

? If you force employees to change passwords every week, be prepared that

they will write them down and post them in their workspaces.

? If it’s too difficult or complicated to access something they need to do

their jobs, they will find less secure work-arounds like using personal

email, USB sticks and using colleagues to bypass restrictions.

? Learn the root cause of unsafe behavior.

要查看或添加评论,请登录

Sean O'Connor的更多文章

  • Cyber Security Awareness Tips

    Cyber Security Awareness Tips

    Phishing Emails · Never respond to requests for personal information via email. Businesses will never ask for personal…

  • What is Ransomware

    What is Ransomware

  • Cybercrime: Profitable Business Model

    Cybercrime: Profitable Business Model

    Overview Top reasons why cybercriminals love the new business model Mass distribution, victim profiling and outsourcing…

  • AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

    AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

    What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills)…

  • CISO’S GUIDE TO SECURELY HANDLING LAYOFFS

    CISO’S GUIDE TO SECURELY HANDLING LAYOFFS

    To limit the potential for a security incident as layoffs occur, follow these 10 best practices: Be part of the…

  • Microsoft data backup in Office 365

    Microsoft data backup in Office 365

    How Office 365 data is protected against loss On Microsoft’s Trust Center, you can read a bit about how data is…

  • Top 5 Common misconceptions about working from home

    Top 5 Common misconceptions about working from home

    During the current COVID-19 crisis, Usherwood, along with most all of our clients have gone to a remote workforce…

  • Remote Workplace Security

    Remote Workplace Security

    Considerations for Remote Workplace Security Usherwood is committed helping clients to enable their remote workforce…

  • Overlooked Security Risks

    Overlooked Security Risks

    As a security professional, when you think about digital security, you think of traditional security tools—firewall…

    1 条评论
  • Serverless computing

    Serverless computing

    Serverless computing is all the rage right now—and for several good reasons: It removes you from having to provision a…

社区洞察

其他会员也浏览了