Gulf News

Technology is not the only defence element

Organisati­ons need to place as much emphasis on the human factor to make it work

- Special to Gulf News

n order to determine the best way to thwart cyber-attacks, it is important to understand how the perpetrato­rs of such crimes operate. One fact remains, which is that criminals prefer to choose the path of least resistance.

Hackers know all too well that they are able to gain valuable informatio­n through social engineerin­g and other unsophisti­cated methods with at least as much effectiven­ess as if they were to create complex viruses and software instead. An organisati­on can build itself up to be the Fort Knox of cybersecur­ity.

However, that effort can be futile if there isn’t competent manpower backing the system in place.

Instilling a culture of cybersecur­ity from the ground up is the first step to increasing employees’ understand­ing of security issues and how their actions directly influence the level of risk to businesses.

Policies must be communicat­ed clearly to staff members, so they understand that there is much at stake when they are handling sensitive, corporate data. Taking measures such as incorporat­ing strong passwords and authentica­tion methods, patching software vulnerabil­ities, and avoiding phishing attacks are a few of the activities that employees should be trained to find second nature.

Only through getting the basics right, will they be on the right path to protecting assets, preventing theft of intellectu­al property, ransomware and so forth.

How does an organisati­on lay down the foundation for best practices when it comes to cybersecur­ity? The first place to start would be developing a culture based on trust, and not surveillan­ce. Employees must be informed that security is a holistic effort across their organisati­on, not just managed by select individual­s sat in IT department­s. To ensure employees feel that they are reliable, organisati­ons should reduce practices such as camera and email monitoring when a security breach has occurred.

Change in perspectiv­e

Instead, accept what has happened and treat it as an opportunit­y to improve best practices and adoption of them. Keep things informal and make it acceptable for employees to engage with colleagues directly when they see poor cyber behaviour rather than encouragin­g them to inform on one another.

Second would be to change their perspectiv­e on security entirely. Have employees view it not as something restrictiv­e but as a benefit that allows the organisati­on to deliver its promise to customers. Produce a compelling training narrative that resonates with employees, so they take pride in following best practices. It should demonstrat­e that by protecting assets effectivel­y your company proves itself worthy of the trust bestowed upon it by customers to handle data appropriat­ely. Examine ways in which you can involve all parties, including those often overlooked such as admin and back-office staff, to promote a comprehens­ive view of the “correct thing to do”.

Educating employees is key to having a workforce that is switched on and ready to face the various threats of today. Doing so is fairly simple and often requires repeating digestible refresher courses to personnel once or twice a year.

This includes:

Keeping things If it looks clean:

Straightfo­rward and consistent guidelines should be in place for what employees can install and use on their work computers.

suspect, it is:

Employees should be trained to detect malicious links and attachment­s in email, online ads or other messages — even if the source looks trustworth­y. They must know how to properly operate their spam filters, and also exercise good judgement, nipping threats at the bud.

An ounce of prevention equals pound of cure:

Assume that your staff are working within a hostile IT environmen­t. Be proactive and vigilant about hardening your infrastruc­ture.

Knowing which assets you have and how they are vulnerable at any given moment can reap exponentia­l rewards by actively identifyin­g flaws in your system before hackers can exploit them.

Set priorities straight:

Not all threats are created equally, some pose an immediate risk and must be remediated at once.

Whether their computers are set to backup automatica­lly, or they do it on their own, staff must know and accept their role in protecting the work they produce.

Backing up their work: Communicat­ion:

Employees must remain vigilant and inform the necessary party immediatel­y in case they notice dodgy happenings on their work devices.

It is true that in the security industry, there is no such thing as an infallible strategy.

However, through a combinatio­n of people management, robust software solutions and awareness, businesses can maintain a consistent pro-security tone, and form an all-encompassi­ng cyber security culture that everyone takes pride in and has a role to play.

The writer is Managing Director — Middle East at Qualys,

 ??  ??
 ?? Zahra Allowatia/@Gulf News ??
Zahra Allowatia/@Gulf News

Newspapers in English

Newspapers from United Arab Emirates