If It’s Convenient Be Suspicious – The Human Aspect

The threat of cyber crime continues to rise. It seems we can’t go very long without reading about yet another company breach.

Research points to a significant increase in sophisticated, socially engineered attacks and a market unprepared to deal with the response. Recent studies indicate that in 93% of cases, cyber criminals breach an organization’s network. Yet more than 40% of executives don’t believe they can keep up with digital transformation and its looming security concerns.

In a world where 21% of breaches occur because of human error, how do CIOs encourage employees to care about security?

Here are three ways to shift focus from convenience to safety in your organization.

Know The State Of Your Business

The first step to mitigating cyber risk is performing a cybersecurity risk assessment. This process identifies potential threats and vulnerabilities in your organization. By exposing risk areas early and often, you have the opportunity to proactively find solutions before a breach occurs.

Further, a robust security plan demands adherence to regulatory guidance. One of the biggest trends in the payment industry is the rise of stricter guidance on handling customer information. To help navigate these changes, companies should:

  • Invest in cloud-based software systems.
  • Utilize business intelligence tools to have data visibility and security at the forefront of every conversation.

Make Employee Training A Necessity

The most prominent vulnerability to any organization is humans. After all, heightened security measures don’t always equate to convenience.

Take, for instance, employee or company credentials. While it’s easy to use similar, or the same password, lessened security measures have a big impact with today’s technological advancements. According to IBM, 19% of breaches are caused by stolen or compromised credentials. Breaches of this type have the longest lifecycle and cost an average of $4.5 million.  

Employees are also often duped by phishing emails and messages soliciting personal or company information. These attacks have increased in sophistication with many appearing from someone within the company or a client.
Companies should take a proactive approach when it comes to dealing with human error. Security awareness training can help decrease IT costs, protect company reputations and security cybersecurity investments. By targeting areas of risky employee IT behavior head on, companies can teach employees how to spot phishing scams, malware behaviors and other potential security threats.

One way to do this is through an interal training program that involves fake scam or phising scenarios sent to employee emails. Vary the type and subject of these scenarios (for example, utilizing a falsified Amazon message around the holidays) to help employees understand the real world implications of a true attack. How employees respond to these type of scenarios will give companies insight into what training is still necessary for their workers.    
Add Increased Security Measures

With the rise of fintech comes the need to shift focus to safety. Additional layers of security protection will protect your client’s most important information - and your business reputation.

Multi-factor Authentication:   Financial institutions should always require multi-factor authentication when accessing accounts. This practical step ensures the right person has access to their funds and transactions by using another trusted mobile device as verification.

Payer Authentication:   Payer authentication, also known as 3-D Secure, adds an added layer of security and greatly reduces the risk of unauthorized credit card usage. Essentially, credit card associations provide additional fraud protection by asking the cardholder to confirm their identity at the time of purchase.

Digital Wallet:   Customer payment methods are quickly shifting from physical to a touchless eCommerce environment. In fact, 35% of credit card owners have added them to a digital wallet. This type of fintech solution couples convenience with security, allowing automated data transfers through a secure channel. When choosing a digital wallet solution, ensure it’s supported by a trusted fintech vendor. Leading providers will constantly be improving on the safety features of the platform and requiring additional security measures like two-factor authentication and biometrics. 

Prioritize Safety Over Convenience

The reality is, it’s not if a cyber attack will happen but when. As business becomes more digitized, consumers are looking for ways to streamline everything, including private, personal information. As a general rule, if it’s convenient, be suspicious.

All information, especially personal client information, can be subject to a breach. By taking proactive steps to optimize security measures, you can be better prepared to face an attack head on and mitigate its impact.  

Travis Everett is  COO of the National Merchants Association    

You Might Also Read: 

Human Error Is A Hacker's Dream:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Law Enforcement Agencies Shut Down Genesis Market
The Dark Side Of The New Dawn In AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Dionach

Dionach

Dionach are a certified information security specialists who provide Penetration Testing, IT Security Auditing and Information Security Consultancy.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Trava Security

Trava Security

Trava simplifies cyber risk management for business owners and IT professionals. Automated assessments, mitigation advising, and data-driven cyber insurance.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.