• Latest
  • Trending
How to Get Your Staff Onboard with Information Security

How to Get Your Staff Onboard with Information Security

December 1, 2021
Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022
AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

May 16, 2022
GrAI Matter Labs Unveils sparsity-native AI SoC

GrAI Matter Labs Unveils sparsity-native AI SoC

May 16, 2022
Tecnotree Launches a Transformation Suite for MTN Ghana

Tecnotree Launches a Transformation Suite for MTN Ghana

May 16, 2022
Ghana with Moringa School and Brighter Investment to promote digital skills for jobs

Ghana with Moringa School and Brighter Investment to promote digital skills for jobs

May 16, 2022
SA Obscure Technologies announces strategic alliance with DNSSense

SA Obscure Technologies announces strategic alliance with DNSSense

May 16, 2022
SLVA Cybersecurity to provide crucial new API security solutions

SLVA Cybersecurity to provide crucial new API security solutions

May 16, 2022
Samsung PRO Endurance Up to 256GB microSD Memory Card

Samsung PRO Endurance Up to 256GB microSD Memory Card

May 16, 2022
Apacer AS2280Q4U M.2 PCIe Gen4 x4 NVMe 1.4 for PS5

Apacer AS2280Q4U M.2 PCIe Gen4 x4 NVMe 1.4 for PS5

May 16, 2022
ProGrade Digital SDXC UHS-II V90 512GB U3 Memory Card

ProGrade Digital SDXC UHS-II V90 512GB U3 Memory Card

May 16, 2022
Team Group T-Force Vulcan Z SATA 2.5-Inch With 3D TLC Flash

Team Group T-Force Vulcan Z SATA 2.5-Inch With 3D TLC Flash

May 16, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 16 May, 2022
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

How to Get Your Staff Onboard with Information Security

by ITECHNEWS
December 1, 2021
in Opinion
0 0
0
How to Get Your Staff Onboard with Information Security

Protecting data is one of the most valuable commodities in the 21st century. While information security may seem like a task dedicated to IT professionals, staff play a critical role in ensuring the company or employee data is secure and protected from any manipulation, inspection or destruction.

Historically, many information security awareness programs have been provided to just “tick a box,” and, as a result, the staff treat it as yet another administrative exercise. They rush through the questions to get back to their day-to-day job, only to revisit it the next year. However, as technology evolves, cyber threat actors continue to transform their tactics by taking advantage of human error, ignorance and deception. We need to find a way to engage with our staff and actually change their behavior – not just their knowledge.

YOU MAY ALSO LIKE

How to Eliminate Certificate Misconfiguration in Kubernetes

Types of Encryption Algorithms

In addition to this, the COVID-19 crisis has forced businesses to operate remotely, thereby placing the organization’s sensitive information at greater risk. A Gartner survey suggests that 80% of company leaders plan to allow employees to work at least part of the time remotely after the pandemic, while 47% will allow employees to work from home full-time. A PWC Survey found that 78% of CEOs agree that remote collaboration is here to stay for the long term.

Therefore, as companies move towards long-term remote or hybrid work arrangements, the need for advanced controls to protect, detect, respond and recover from a cyber-attack or data breach is greater now more than ever before. So how can employers cultivate a security culture in their organization?

  1. Make security personal: Employees are the frontline of defense against cyber-attacks and malicious actors. Companies need to make security personal by encouraging staff to think about protecting themselves and their families, not just the firm, from a cyber-attack. To help with this, organizations should develop innovative programs and think outside the box so that they can help foster a sense of responsibility towards cyber-attacks among their staff members. For example, companies could engage with a children’s charity and have ‘lunch and learn’ sessions
    with the staff on talking to their kids about social media and online threats.
  2. Introduce security awareness programs: According to IBM Security’s 2020 “Cost of a Data Breach Report,” having a remote workforce was found to increase the average total cost of a data breach by $137,000, for a total global average cost of $3.86 million in 2020. Hackers can spend months trying to reconnoiter and then compromise their targets. In return, they are happy to spend thousands of dollars in advanced IT Control but refrain from investing money in an impactful awareness program. Therefore, employers must treat information security awareness training as a prerequisite to changing behavior and invest in security awareness programs that benefit their employees professionally and personally.
  3. Teach the lesson of cause and effect: Providing an interactive environment to learn about information security can go a long way in ensuring employees take the training program seriously. If the staff is exposed to the financial and reputational costs of cyber-threats, it can help them recognize the link between their action and outcome. The aim of such initiatives should be to change staff’s behavior, not to close an audit point or to tick a box.
  4. Educate your staff on some of the techniques used by cyber-criminals:  This includes not the technical details of a hack or exploit, but how stolen personal data, often harvested from social media sites, can be used to trick or “socially engineer” people into clicking on a malicious link or visiting a malicious email. Provide advice on locking down social media accounts and not sharing personal data outside people they actually know.

Nowadays, attackers use various tools and techniques to profile employees of the company they would like to target. Therefore, internet security has become a priority as more companies explore API integrations, creating another point of potential security short for those caught unaware. Those who haven’t recognized this yet, need to make this a business precedent and educate its staff to be part of the solution – not the problem.

David Cripps Chief Information Security Officer , Moneycorp

ShareTweetShare

Get real time update about this post categories directly on your device, subscribe now.

Unsubscribe

Search

No Result
View All Result

Recent News

Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022
AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU

May 16, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Apple is reportedly testing iPhones with USB-C

Apple is reportedly testing iPhones with USB-C

May 16, 2022
Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC

May 16, 2022

Recent News

  • Apple is reportedly testing iPhones with USB-C May 16, 2022
  • Nintendo Working on Next-Gen Switch Powered by an NVIDIA SoC May 16, 2022
  • AMD Instinct MI300 Exascale APU Features Zen4 CPU and CDNA3 GPU May 16, 2022
  • GrAI Matter Labs Unveils sparsity-native AI SoC May 16, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021 iTechNewsOnline.Com - Powered by BackUpDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Go to mobile version