If It’s Convenient Be Suspicious – The Human Aspect

The threat of cyber crime continues to rise. It seems we can’t go very long without reading about yet another company breach.

Research points to a significant increase in sophisticated, socially engineered attacks and a market unprepared to deal with the response. Recent studies indicate that in 93% of cases, cyber criminals breach an organization’s network. Yet more than 40% of executives don’t believe they can keep up with digital transformation and its looming security concerns.

In a world where 21% of breaches occur because of human error, how do CIOs encourage employees to care about security?

Here are three ways to shift focus from convenience to safety in your organization.

Know The State Of Your Business

The first step to mitigating cyber risk is performing a cybersecurity risk assessment. This process identifies potential threats and vulnerabilities in your organization. By exposing risk areas early and often, you have the opportunity to proactively find solutions before a breach occurs.

Further, a robust security plan demands adherence to regulatory guidance. One of the biggest trends in the payment industry is the rise of stricter guidance on handling customer information. To help navigate these changes, companies should:

  • Invest in cloud-based software systems.
  • Utilize business intelligence tools to have data visibility and security at the forefront of every conversation.

Make Employee Training A Necessity

The most prominent vulnerability to any organization is humans. After all, heightened security measures don’t always equate to convenience.

Take, for instance, employee or company credentials. While it’s easy to use similar, or the same password, lessened security measures have a big impact with today’s technological advancements. According to IBM, 19% of breaches are caused by stolen or compromised credentials. Breaches of this type have the longest lifecycle and cost an average of $4.5 million.  

Employees are also often duped by phishing emails and messages soliciting personal or company information. These attacks have increased in sophistication with many appearing from someone within the company or a client.
Companies should take a proactive approach when it comes to dealing with human error. Security awareness training can help decrease IT costs, protect company reputations and security cybersecurity investments. By targeting areas of risky employee IT behavior head on, companies can teach employees how to spot phishing scams, malware behaviors and other potential security threats.

One way to do this is through an interal training program that involves fake scam or phising scenarios sent to employee emails. Vary the type and subject of these scenarios (for example, utilizing a falsified Amazon message around the holidays) to help employees understand the real world implications of a true attack. How employees respond to these type of scenarios will give companies insight into what training is still necessary for their workers.    
Add Increased Security Measures

With the rise of fintech comes the need to shift focus to safety. Additional layers of security protection will protect your client’s most important information - and your business reputation.

Multi-factor Authentication:   Financial institutions should always require multi-factor authentication when accessing accounts. This practical step ensures the right person has access to their funds and transactions by using another trusted mobile device as verification.

Payer Authentication:   Payer authentication, also known as 3-D Secure, adds an added layer of security and greatly reduces the risk of unauthorized credit card usage. Essentially, credit card associations provide additional fraud protection by asking the cardholder to confirm their identity at the time of purchase.

Digital Wallet:   Customer payment methods are quickly shifting from physical to a touchless eCommerce environment. In fact, 35% of credit card owners have added them to a digital wallet. This type of fintech solution couples convenience with security, allowing automated data transfers through a secure channel. When choosing a digital wallet solution, ensure it’s supported by a trusted fintech vendor. Leading providers will constantly be improving on the safety features of the platform and requiring additional security measures like two-factor authentication and biometrics. 

Prioritize Safety Over Convenience

The reality is, it’s not if a cyber attack will happen but when. As business becomes more digitized, consumers are looking for ways to streamline everything, including private, personal information. As a general rule, if it’s convenient, be suspicious.

All information, especially personal client information, can be subject to a breach. By taking proactive steps to optimize security measures, you can be better prepared to face an attack head on and mitigate its impact.  

Travis Everett is  COO of the National Merchants Association    

You Might Also Read: 

Human Error Is A Hacker's Dream:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Law Enforcement Agencies Shut Down Genesis Market
The Dark Side Of The New Dawn In AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tech Industry Forum (TIF)

Tech Industry Forum (TIF)

Tech Industry Forum is a not-for-profit, membership driven trade body. We bring together end users and some of the UK’s leading cloud, software, platform, infrastructure, and service providers.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Proofpoint

Proofpoint

Proofpoint provide the most effective cybersecurity and compliance solutions to protect people on every channel including email, the web, the cloud, social media and mobile messaging.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

Centric Consulting

Centric Consulting

Centric Consulting is an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. 

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.