CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

It Should Be ‘Cybersecurity Culture Month’

admin by admin
April 8, 2022
in Information Security
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter



Bill Brenner

cybersecurity awareness, Proofpoint, security culture

October 19, 2021

It’s Cybersecurity Awareness Month, but security awareness is about much more than just dedicating a month to a few activities. Security awareness is a journey, requiring motivation along the way. And culture. Especially culture.
That’s the point Proofpoint Cybersecurity Evangelist Brian Reed drove home in a recent appearance on Business Security Weekly.
“If your security awareness program involves getting excited about sending ‘don’t click on links’ emails in October, you’re doing it wrong,” he said. “The biggest problem I have with the term security awareness is ‘security awareness.’ That’s a sub-section of the problem. The bigger need is about building a culture.”
That means a culture that makes security personal but relevant. It’s about making it relatable to individuals based on their company roles.
Reed gave the example of a client who got a lot of pushbacks from executives who didn’t want “all these additional security controls – yet another endpoint, another browser plug-in.”
The remedy: Treat them like VIPs.
“It’s about saying, in this case, ‘we want to protect YOU and your personal brand, Mr. Executive.’ Let them see you building a boutique security program just for them,” Reed said.
It’s also about helping employees understand the consequences of their actions. Do they know the boundaries of what they’re supposed to be doing day in and day out? What sorts of rights and privileges is the company giving new partners? Are they starting off on the wrong foot from the get-go?
The days of having stale, computer-based training modules is no longer helpful – if it ever was. Newer ways need to be focused around:
·       Nano-learning/micro-learning
·       Activities and communication that’s based more on job-role
·       Using humor to relate to people, to show you understand where they’re coming from.
 
To the last point, humor can include using the things that happen during calls: dogs barking, kids pulling your leg to go do homework – relatable things.
“We should work that into the training where appropriate,” Reed said.
 
The need for security culture inside companies was illustrated by the results of Proofpoint’s “2021 State of the Phish Report” – which found that 74% of organizations experienced a “successful” phishing attack in 2020. These attacks resulted in data loss, account compromise, ransomware and other malware infections, and financial loss.
While the report noted a small improvement in user identification of threats, much more education is needed to ensure users don’t fall prey to the ever-increasing frequency and sophistication of social engineering attacks. 
Check out the full episode, sponsored by Proofpoint, and visit https://securityweekly.com/proofpoint to learn more about the company!



Source link

Previous Post

Ransomware mitigation: Using Amazon WorkDocs to protect end-user data

Next Post

Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’

Related Posts

Information Security

Yes, Containers Are Terrific, But Watch the Security Risks

by admin
May 24, 2022
Information Security

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

by admin
May 23, 2022
Information Security

An Interview with a White Hat Hacker

by admin
May 23, 2022
Information Security

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

by admin
May 23, 2022
Information Security

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

by admin
May 22, 2022
Next Post

Google Play Bitten by Sharkbot Info-stealer ‘AV Solution’

Leave Comment

Recommended

Japan Airlines: digitally re-imagining the air passenger experience

May 24, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

May 24, 2022

Learn to work with the Office 365 unified audit log

May 23, 2022

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

May 23, 2022

An Interview with a White Hat Hacker

May 23, 2022

Q&A with Kristin Myers, EVP/CIO, Mount Sinai Health System & Dean of Digital & Technology

May 23, 2022

© 2022 CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 JNews - Premium WordPress news & magazine theme by Jegtheme.