Establishes a common security posture—A common posture includes:
- Defining the organization’s information security and privacy policies that lay the foundation for regulatory compliance – Providing commonality and standards among a diverse organizational culture
- Providing a starting point for the ongoing improvement of the awareness program and practices because the threats keep evolving and criminals adapt to countermeasures
- Training new hires and the uninformed about security and privacy threats, risk and concerns (because employees may not have prior knowledge about the threats)
- Incident response team (IRT), which is responsible for information security incident response and handling
- Chief information security officer (CISO), who is responsible for enterprise policies and procedures, and the staff who support it
- Privacy officer (PO), who is responsible for privacy policy, procedures, processes, standards and privacy incident response
- Help desk personnel because they know what to do in the event that a machine or the network is having problems or is acting unusual or erratic
- Building security, because it would inform employees of protective measures and procedures related to the building, the people and the working environment
- An awareness program can inform employees that the organization’s information is always at risk from various localized threat actors, such as a malicious network administrator, an insider, a visitor, and possibly friends and family.
- Other organizations, such as foreign governments, criminal organizations, criminals and identity thieves, can also be threats that increase the risk to the organization.
- An awareness program can provide information about how the organization enforces protective controls against the threats from malicious acts and negligence via processes, procedures and technology.
- Awareness combined with vigilance helps reduce the threat of an insider attack and the theft of computing equipment, mobile data storage media and hard copy information.
- Employees’ awareness of the security ramifications of misusing the most powerful computer (i.e., the human brain). Instilling and promoting security is up to users and everyone around them.
- Highlights the risk scenarios associated with poor security and privacy practices, and it discourages these bad practices. By teaching staff to protect their work, the enterprise is discouraging malicious behavior such as selling secrets and PII.
- Recognizes when there is the potential risk of losing current, potential and past employee and customer information (e.g., PII and protected health information [PHI]). Loss of the data can be costly to the organization both financially and in reputation. The worst-case scenario is business closure.
- In financial institutions, there are business and personal risk factors associated with customer account information. Identity thieves have many ways to exploit loan, savings, checking and money market accounts and credit information. Tax information can also be exploited by malicious individuals for fraudulent purposes and monetary gain.
Personal and Employee Benefits
An organization’s awareness program can teach employees how to improve security and privacy in their personal lives. Security awareness can have a positive effect on employees, their families, friends, neighbors and homes. Having an awareness that vulnerabilities exist in wireless portable computing devices, home networks and mobile computing devices (e.g., smartphone, laptop, computer tablets) provides people a base from which to implement protective controls. Some benefits include:
- Legal—There is an awareness that individuals can be held personally liable for the mishandling of personal and sensitive data at work. Penalties vary by organization.
- Ethical—Individuals can be taught the ramifications (e.g., fines, jail time) of pirating software such as music, games and videos.
- Employment status—Not following security policies can cause employees to get reprimanded and/or penalized, even fired. It is everyone’s responsibility to protect the organization and the data it acquires.
- Mentoring—By learning about the organization’s regulatory compliance requirements (and the law), employees can become more law-abiding and can be mentors to others. Information that can be shared with others includes how to avoid email and phishing scams, tricks used by cyberpredators, personal safety practices, preventative and reactive action to take in a cyberemergency, and more.
- System access—An awareness program can inform users about the system access rules and guidance related to password strength, length, composition (i.e., combination of characters), number of attempts allowed, entry duration, etc. Access controls not only apply to the devices that are used, but also to network devices. The access training received at work should be taught to those in the household to help prevent intrusions to personal information and the home/family environment.
- Computer weaknesses—An awareness course can teach users about vulnerabilities in personal mobile computing devices and desktop computers and the need for software patches and upgrades.
- Social media—Social media software applications (e.g., Facebook, Twitter, Skype, LinkedIn, blogs) can expose users to a variety of malicious threats such as identity theft, cyberbullying, kidnapping and more. An awareness course can teach people what not to put into the public domain that can be used against them.
- Family activities—Information security awareness and data loss prevention training obtained at a place of employment can be used to mentor the employee’s family and to prevent the misuse of information about the family’s habits and routines. If misused, the information can provide burglars an opportunity to enter a home and take valuables.
Conclusion
The human brain is the most complex computer, and individuals are in charge of educating it. It is very important that the brain be aware of what it can and should do to protect the organization, the individual, the home and everyone around them. Remember that everyone can be affected by one person’s actions or lack thereof. Investing in developing and implementing a security and privacy awareness program that covers the topics discussed not only helps to protect the organization and the data, but can help people and trading partners as these best practices are spread.
There are many organizations that can be found on the Internet that provide security and privacy awareness training. Three publicly available organizations that provide good information security awareness material and programs are the SANS Institute, 4 Stay Safe Online 5 and the International Information System Security Certification Consortium (ISC) 2 Safe and Secure Online. 6
Endnotes
1 Wlosinski, L.; “Key Ingredients to Information Privacy Planning,” ISACA Journal, volume 4, 2017, www.isaca.org/resources/isaca-journal/issues
2 Wlosinski, L.; “Data Loss Prevention—Next Steps,” ISACA Journal, volume 1, 2018, www.isaca.org/resources/isaca-journal/issues
3 National Institute of Standards and Technology, “Federal Information Systems Security Educators’ Association (FISSEA),” USA
4 SANS Institute, https://www.sans.org/security-awareness-training
5 StaySafeOnline
6 International Information System Security Certification Consortium, Safe and Secure Online, USA, https://safeandsecureonline.org/
Larry G. Wlosinski, CISA, CRISC, CISM, CAP, CBCP, CCSP, CDP, CIPM, CISSP, ITIL V3, PMP
Is a senior consultant at Coalfire-Federal with more than 19 years of experience in information security and privacy. Wlosinski has been a speaker on a variety of IT security and privacy topics at US government and professional conferences and meetings. He has written numerous articles for magazines and newspapers, including articles for the ISACA Journal.