Training Your Employees About Cyber Security
Jason Silverglate - SMB Technologist

Training Your Employees About Cyber Security

In our August newsletter, I wrote a little about the importance of training employees on information security best practices. In addition to outlining some of the risks that come with inattentive or outright malicious employees, I also offered a few tips for onboarding new staff and retraining current team members.

Since then, I’ve had a few people request more a detailed guide to teaching cyber-security, so I’m going to do my best to hold your hand through the process.

Pencils out, class.


Onboarding

Employee orientation may be a more or less rigidly-structured process depending on how you like to run things at your office, but it generally involves a fair amount of HR paperwork, a tour of the facilities, introductions to colleagues and whatever degree of training or mentorship is required to get them ready to work at their position independently. But virtual orientation is just as important as physical orientation. You should be making sure new employees are given walkthroughs of:

  • The company server – Where are key documents and resources housed? Who has access? If there is a filing system in place, how is it organized and what can safely be altered?
  • Security policies – It’s nearly the third decade of the 21st Century. You should have a robust and modern IT security policy. It must be simple enough that even less technologically-adept team members can keep its basics in mind, yet comprehensive enough to cover eventualities. It’s also useless if your employees never really learn it in the first place. If you’re just handing new hires a sheaf of worksheets and expecting them to absorb it, you may be in for a rude awakening.
  • Passwords – Asking clients about password security is the “Are you sure it’s plugged in?” for IT support specialists. We have to do it any time a problem arises, and it turns out to have been the root of the problem more often than you’d think. Passwords must be changed on a regular basis (quarterly, monthly or even weekly, depending on the sensitivity of the data you’re protecting). They must be difficult to crack, with a combination of numbers, letters and other characters. And they must be unique—if your employee’s “home123”-style email password is compromised, there’s a fair possibility a hacker will also try it out on their work account.
  • Phishing – Phishing is when a malicious actor (or their software created for the purpose) impersonates someone you trust in order to compromise your personal information. We talked about some of the specific ways phishing can threaten your business in this post, but even over the past year, the number of threat vectors has continued to diversify. Train employees how to recognize phony emails, IMs, texts and phone calls. This includes keeping an eye on the behavior of colleagues! When an employee’s account is compromised by ransomware, it will behave erratically. As new hires become more familiar with their fellows, remind them to use what they know to be smart to threats. A lot of successful phishing schemes aren’t even particularly sophisticated once your employees are accustomed to thinking more critically.


There are plenty of other basics to make sure your employees know, like avoiding sending confidential information via unsecured connections, and keeping tight-lipped on social media—a good cyber-security training curriculum will go into far more detail than we can here, but you probably have an idea at this point of where you need to go with your on-boarding. The other important factor is to make sure employees are aware that there are consequences for failing to follow company security policy and to enforce those consequences.

Obviously, you’re not going to be putting employees in a stockade for leaving their workstation logged in at night. But you should at least be treating breaches with the same amount of concern you would if, say, one of your keyholders consistently left the office front door propped open when they went home.

An unlocked account in the wrong hands can be more dangerous than any unlocked door.


Training & Re-Training

For all of the grouchiness a lot of business owners espouse about millennials, they’re actually a breath of fresh air from an IT security perspective.

Those who have grown up with the internet have a degree of online literacy their older colleagues often never attain, and they’ve been fending off scams and phishing schemes since primary school. But what about Greg in marketing, who’s never heard of Instagram?

All of what we said about onboarding applies equally, if not more so to your existing staff. (This goes double if they didn’t receive good cyber-security training in the first place.)

For one thing, the online best practices they were taught may no longer apply to modern conditions, and memory has a habit of fading if it’s not frequently refreshed.

Staff need to be updated on the latest threats and new challenges on a regular basis and empowered to understand that they have a personal stake in protecting the company’s information security.

Some ideas:

  • Schedule annual refresher courses
  • Make existing staff part of the cyber-security orientation for new employees
  • Run information breach “drills” to help senior employees understand their responsibilities in the event of a disaster

And how about considering a "live fire exercise"? 

An article in Tech Republic caught our attention because it appeared to be a great way to keep employees on their toes after a training has occurred. Here's a clip from the article:


Consultation

At Continuous Networks, we offer a full suite of cyber-security consulting and support services for companies with small or non-dedicated IT departments. This includes taking on one of the most important HR responsibilities of any office tech guru: teaching.

We can help you develop a bespoke training and education program for your staff, setting easy-to-follow guidelines your staff can use for onboarding, or even having one of our experts drop by the office to conduct training sessions and follow-ups as required.

It’s our job to be at the leading edge of new developments online, and we’re happy to share that knowledge with our clients to make sure your “human firewall” is strong enough to keep the bad guys on the outside looking in.



要查看或添加评论,请登录

Jason Silverglate - SMB Technologist的更多文章

  • Demystifying the Cloud; What it is and why you should care

    Demystifying the Cloud; What it is and why you should care

    THE CLOUD IS HERE TO STAY Phrases like “the cloud is the future of technology," “the cloud is revolutionary,” and “the…

    1 条评论
  • The "INTERNET OF THREATS"- Protecting Small Business Networks.

    The "INTERNET OF THREATS"- Protecting Small Business Networks.

    The IoT Threat Kaspersky Labs reported an estimate of 20 billion IoT devices could exist by 2020. Although IoT isn’t an…

  • Breaking Bad Technology Habits

    Breaking Bad Technology Habits

    Almost everyone has bad habits in real life. While technology should help us break some bad habits, all too often it…

  • Looking Into The Future of Data Security for Your Business

    Looking Into The Future of Data Security for Your Business

    Today, I’m taking a look into Data Security for your business. Specifically, issues that are influencing best practices…

  • PROTECTING YOUR BUSINESS FROM TECH SCAMS

    PROTECTING YOUR BUSINESS FROM TECH SCAMS

    As a provider of high-quality IT solutions at Continuous Networks I have been working to help businesses achieve more…

    1 条评论
  • In Case Of (A Data) Emergency, Read This

    In Case Of (A Data) Emergency, Read This

    In a somewhat ironic scenario, many businesses still have those red metal emergency boxes attached to the walls within…

  • Is It Time to Change Your IT Provider?

    Is It Time to Change Your IT Provider?

    If you’re still struggling to overcome ongoing business challenges, perhaps it’s time to try another IT provider who…

  • How The Dark Web IMPACTS Small Businesses

    How The Dark Web IMPACTS Small Businesses

    Beneath the surface of the Internet, there’s a mysterious world known as the Dark Web that has the potential to wreak…

    1 条评论
  • Technology Questions and Misconceptions

    Technology Questions and Misconceptions

    In the IT world, I’ve also heard my fair share of technology misconceptions. The purpose of today’s article is to…

    1 条评论
  • SMEs In Cyber Attack Crosshairs

    SMEs In Cyber Attack Crosshairs

    If you’re in Business, you’re a Target. As a SME, you probably rarely think about the threat of a cyber-attack.

社区洞察

其他会员也浏览了