What do you think of when you hear cybersecurity? Information technology (IT)? The Internet? Hackers? Data breaches? Maybe you just think, âAll this internet stuff is scary, glad we have an IT team to protect us.â A common misconception is that IT departments bare all the burden of keeping cybersecurity risks at bay. Yet, todayâs reality shows that couldnât be further from the truth.
Combating cyberattacks requires an organization to band together and embrace better security protocols from top to bottom. Building this type of culture increases an organizationâs resilience to cyber threats more than any single IT department.
Before you can build a culture that embraces cybersecurity, you have to understand what it is. According to dictionary terms by Merriam-Webster, cybersecurity is âmeasures taken to protect a computer or computer system (company network) against unauthorized access or attack.â However, looking at the broader meaning of cybersecurity, it extends well beyond just the technology used to do our jobs and protect our systems, it includes our people, processes and culture.
Today, the old mindset that cybersecurity falls on the shoulders of the IT department doesnât translate into the digital era we live and operate in. Shifting the mindset of the organization to understand threats apply to everyone is an important component in building a resilient cybersecurity organization.
Although having a strong team of IT security experts and continuing to invest in technology is a step in the right direction, even the best technology and team cannot provide absolute security for an organizationâs biggest threat â its people. This includes malicious insiders, employees falling victim to social attacks like phishing or pretexting, and just plain old human error. According to Verizonâs 2018 Data Breach Investigations Report, one in five breaches were a result of human error.
How can your organization create a security-centric culture? Outlined below are five ways your organization can start shifting its culture.
1.Â Lead by Example – Here comes the buzzword â âtone at the top.â An organization needs key decision makers and influencers to be on-board with cybersecurity. Creating and fostering a mindset for a cyber-aware culture can only be done by leadership pushing the efforts. This includes educating employees on their roles and responsibilities as they relate to cybersecurity, understanding and standing behind security investments, and encouraging the organization to include cybersecurity within the enterprise risk framework. Not to say leaders must obtain a deep and thorough understanding of all that is cyber, but demonstrating common security practices within their day-to-day activities and inspiring others to be diligent when it comes to these cyber risks is the first step to building the right cybersecurity culture.
2.Â Deploy On-Going Training – We have all heard the saying âknowledge is powerâ and this statement may never be truer in todayâs interconnected world. The best way to provide employees with the tools to assist in the organizationâs cyber defense is to educate them. There is not a one size fits all solution to training, as each organizationâs approach will be different. Training may include online learning platforms, social engineering campaigns, in-person classes, frequent communication from leadership, or even simple posters in common areas. Employees should understand how to identify unusual activity, such as suspicious emails or system functions, and actions to take immediately to help resolve any concerns before they exponentially grow.
Setting the expectation and the organizationâs stance on cybersecurity from day one for employees is important. Consider including the training as part of your onboarding process. Yet, to be most effective, repetition is required. For example, did you know October is National Cybersecurity Month? This is great time every year to reinforce cyber awareness to the organization.
3.Â Evaluate Performance â Incentives have long been used to impact behavior and business directions. Financial and operational performance metrics are commonly used to shift company focus, say from sales to customer services, and the time has come to add security metrics to our performance management process. Performance goals for security might include timely completion of security training, positive trends to security or policy violations, and well-trending social engineering exercise results.
4.Â Set the Expectations â Having formal documentation, such as technology policies and procedures, that have been approved or supported by the leadership team allows employees to go back and reference what is expected of them anytime a potentially suspicious situation arises. Common polices include establishing minimum requirements for system passwords, and how to create a secure and easy to remember passphrase, the required use of multi-factor authentication, formal requirements for handling public, sensitive and confidential data; and outlining consequences for non-compliance.
5.Â Assess Progress â Cybersecurity programs canât remain static to be effective. Assess your organization and its employeesâ progress. Many organizations rely on an independent third-party vendor, such as Doeren Mayhew, to perform various cybersecurity reviews to help uncover the true effectiveness of the program. These can range from the basics of cyber posture checks to determine if proper controls are in place, to performing social engineering campaigns to surface employee weaknesses, to identifying network or perimeter risks through a vulnerability assessment. Assessing your organizationâs progress annually can provide good benchmarking metrics to see where you stand against your cybersecurity goals and gain knowledge to share with employees on the impact of their role.
Creating a culture of security requires everyone to understand the role they play in it. Implementing these basics to help with that can make that mindset shift much easier to build a resilient cybersecurity culture.
For assistance in evaluating your cybersecurity program or building its framework, contact Doeren Mayhewâs cybersecurity advisors. We have a suite of CYBERCLAWâ˘ solutions that can be tailored to fit your organizationâs needs and budget.
A quick registration is required to view our resources.
You will only be asked to do this one time (unless you don't save your browser cookies).