{"id":18645,"date":"2016-03-07T16:12:53","date_gmt":"2016-03-07T23:12:53","guid":{"rendered":"https://www.webroot.com/blog/?p=18645"},"modified":"2019-09-30T10:09:01","modified_gmt":"2019-09-30T16:09:01","slug":"18645","status":"publish","type":"post","link":"https://www.webroot.com/blog/2016\/03\/07\/18645\/","title":{"rendered":"Helping Organisations Stay Secure In An Unsecure Age"},"content":{"rendered":"\n<p>Seemingly every day, we&#8217;re reminded that companies need to work harder&nbsp;to stay secure during a time where cybercrime is&nbsp;rampant and many organizations remain vulnerable to attack. &nbsp;I&#8217;ve recently been speaking to the press about what can and should be done to mitigate these risks. I hope the following questions and answers will help shed some light on some key problems many organizations face, and help you decide what&#8217;s best for your business.<\/p>\n\n\n\n<p><strong>What happens if an organization focuses too much on the technology aspect of security and not enough on people and process?<\/strong><\/p>\n\n\n\n<p>Unfortunately, an organization is only as strong as its weakest link \u2013 and in terms of security, employees are by far the weakest link.<\/p>\n\n\n\n<p>Technology plays an essential role in any defense, but at the same time technologies cannot stop an employee giving their details out over the phone to someone they believe is from the IT department.&nbsp; And it cannot stop an employee using their corporate password for on their favorite social media sites or writing down their hard to remember passwords.<\/p>\n\n\n\n<p>Relying purely on technology as an organization\u2019s only form of defense is extremely short-sighted; failure is inevitable.<\/p>\n\n\n\n<p><strong>How often are companies attacked because of a vulnerability caused by employees or company processes?<\/strong><\/p>\n\n\n\n<p>It\u2019s hard to put an exact number this. But from experience, I would suggest it\u2019s a very high percentage.&nbsp; Why wouldn\u2019t it be? Cybercriminals spend so much time, effort and money defeating a technology or defense when employees are such an easy target.<\/p>\n\n\n\n<p>In terms of hackers getting in, the most common issues&nbsp;are misuse of social networking, weak passwords and password re-use, privilege creeping, malware and lack of system patching. But the real danger is employees being unaware of internal security policies or the ones that unfortunately do not care enough and are careless and complacent.<\/p>\n\n\n\n<p><strong>How can CIOs and CISOs go about strengthening their strategy around people and process to ensure cyberattacks aren\u2019t successful?<\/strong><\/p>\n\n\n\n<p>There\u2019s no magic wand. There\u2019s an infinite number of initiatives that can be introduced to help mitigate risk, all at differing costs and complexity. &nbsp;In simple terms, it\u2019s about completing comprehensive risk assessments, creating policies and understanding industry best practices, evaluating possible technologies, and then, implementing a solution.&nbsp; More than anything, the plan needs buy-in at all levels and needs an appropriate budget.<\/p>\n\n\n\n<p>Training should always be at the heart of an organization\u2019s security program as technology alone will not stand up against a motivated attacker.&nbsp; Everyone within the organization should be made responsible for the security of its assets.<\/p>\n\n\n\n<p>It\u2019s also vital that personnel understand the technologies they are asked to manage and monitor. The intelligence gathered by security systems needs to be understood, so when an attack occurs, it is detected at the first possible opportunity with the correct processes and procedures, then followed.<\/p>\n\n\n\n<p><strong>How can CIOs and CISOs approach internal training and education in regard to security?<\/strong><\/p>\n\n\n\n<p>Employee involvement is crucial for the success of an organization\u2019s security strategy. Creating a security task force whose members rotate so each employee has eventually been part of the task force is a great way to get everyone involved. Each task force could have a \u2018security champion\u2019, who would be the person who identifies the most beneficial improvement to current security processes. This system encourages employees to think actively as well as creatively about security&nbsp;to improve the company\u2019s security.<\/p>\n\n\n\n<p>There is often a disconnect between what employees know they should do security-wise, versus what they actually do in practice. This is one of the most challenging parts of <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/security-awareness\">cybersecurity training and education<\/a>. In these cases, businesses need to make sure it is clearly explained what is prohibited and why \u2013 using real world examples of the repercussions of not following procedure. What might seem harmless to an employee, like using an unsecure WiFi network, could cause a business serious problems further down the line.<\/p>\n\n\n\n<p>There\u2019s no point just preaching security, it should be made fun.&nbsp; It\u2019s also important to understand if the information given has been taken in.&nbsp; This is where regular security tests play a vital role.&nbsp; Bad security practices should not be tolerated if appropriate training and guidance has been given.&nbsp; At the same time good security practices should be rewarded.<\/p>\n\n\n\n<p><strong>Can you provide an example of an organization that suffered a major cyberattack because their people and process strategy was not up to scratch?<\/strong><\/p>\n\n\n\n<p>The breach at Target Corp in late 2013 springs to mind for a number of reasons.&nbsp; It is understood the attack initiated at a third party vendor, an air conditioning subcontractor through a phishing email.&nbsp; User education with regards to the opening of emails may have been able to stop such an attack from escalating.<\/p>\n\n\n\n<p>An assessment by security experts at Verizon noted that while Target had a password policy, it was not followed.&nbsp; A file containing valid network credentials was found stored on several servers, with weak or default passwords used on many internal systems.<\/p>\n\n\n\n<p>It was also reported that many systems were found to be unpatched, something a patch management policy should have covered even after Target\u2019s security systems warned of possible issues. No credible incident response plan was in place, as a Target statement at the time highlighted that after the company learned criminals had entered the network, the team decided it did not warrant immediate follow-up.<\/p>\n\n\n\n<p><strong>Do you expect to see people and process strategies around security improving this year?<\/strong><\/p>\n\n\n\n<p>Security is finally climbing up organizations\u2019 agendas, so hopefully improvements around people and processes will continue to be made.<\/p>\n\n\n\n<p>Communications and information flow between the organization and its employees is vital \u2013 the risks and potential consequences need to be understood by employees through continued user education.&nbsp; It\u2019s arguably the most cost effective approach to improving the security posture of any organization.<\/p>\n\n\n\n<p>However, cybercriminals only need to find one hole in the defense, whereas as security professionals, we have to secure all.&nbsp; It\u2019s never going to be an easy task, but sound user education and relevant processes are now more important than ever and should never be underestimated.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seemingly every day, we&#8217;re reminded that companies need to work harder&nbsp;to stay secure during a time where cybercrime is&nbsp;rampant and many organizations remain vulnerable to attack. &nbsp;I&#8217;ve recently been speaking to the press about what can and should be done to mitigate these risks. I hope the following questions and answers will help shed some [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":18441,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[19623,24849,7913,7909,4125,19627,3713,19615,19633,18963,3479,19631,19629,19621,19617,6397,3777,19625,19619,9137],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/18645"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=18645"}],"version-history":[{"count":13,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/18645\/revisions"}],"predecessor-version":[{"id":29243,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/18645\/revisions\/29243"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/18441"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=18645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=18645"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=18645"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=18645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}