Trust, but Verify: Article 6 of 7
In this, our sixth installment of the blog, we explore what really makes or breaks the security world – people. All the firewalls, password protection, and 2-step verifications in the world can’t stop cyber security threats if the people in our organizations forget to engage in cyber safety.
Imagine protecting your home with alarm systems and then leaving your doors unlocked. It’s the same when a company’s employees engage in unsafe behaviour.
What is unsafe behaviour and how can a company curb it?
When employees interact with technology there are so many opportunities to misstep. Let’s look at email alone – phishing scams, social engineering, ransom, and malware all make their way into our inboxes oftentimes in a seemingly innocuous way. Sneaky, right? With more and more people accessing the web on mobile devices it’s easy to let the threat of unsafe employee usage lead to safety overwhelm.
At rSolutions our creed is “Trust, but verify.” By finding your own balance to trust and verify, your company can navigate cyber security in a way that protects and allows operations to continue smoothly – and even grow.
October is Cyber Security Awareness month. Here are some guidelines to build trust and verification.
Make sure you’ve got all the avenues covered to get the information to your people about cyber security. Build awareness through training. Communicate. Educate.
Empower your people to implement their awareness training, make informed choices, and also to make suggestions to improve security where they see chinks in the armour.
Leaders who encourage create new leaders. Leadership that makes security a priority builds employees who make security in their own roles a priority. Creating a strong foundation for visible and proactive leadership will reap rewards far into the future while establishing a baseline of conduct for safe and acceptable standards.
Wishing you all a safe and secure October, and a successful Cyber Security Awareness month!
Post 1: XDR technology and how it works
Post 2: XDR: How the Evolution of Endpoint Technology is Moving Beyond the Endpoint
Post 3: Your Network and the Cyber Attack Lifecycle
Post 4: XDR vs SIEM; why they’re not the same and what else you need to know
Post 5: Attack Surface Management