Review Your Cybersecurity Awareness

In 2018, a person couldn’t listen to the news without hearing of the latest company breach, which included many well-known companies such as Adidas, Timehop, Saks Fifth Avenue, Panera, T-Mobile and Facebook. 

Several of these breaches affected subscribed users or patrons by exposing their personally identifiable information which they entrusted to these companies.

Some breaches were caused by insider threats, some by social engineering and others by unpatched vulnerabilities. Yet, with all of these breaches this year and years past, phishing still remained one of the top attack vectors in 2018, and will continue to play a major role in the threat landscape of 2019 and beyond. 

Phishing, along with other social engineering attack vectors, preys on the human element. If 2018 taught us anything, it’s that companies need to use a more proactive approach in order to try to prevent these attacks from happening in the first place. 

This can be made possible by holding the human aspect of security in high regard and ensuring that training and education continue to play a large part in a multi-layered approach to security. 

While social engineering continued to stay on the security radar in 2018, automation and Artificial Intelligence were two topics that truly became popular buzzwords in the industry, and we can expect to see more of these being implemented into security programs going forward.

Although these are both massive technological advancements for the industry, still the human factor remains thus they will need to be used in conjunction with training to help prevent incidents. 

From a security awareness perspective, another growing trend that needs to be addressed going forward is connected devices. We are in an “always-on” culture, surrounded by technology that we enable to make our lives move faster and more efficiently.

However, with this connectedness comes more risks, and these risks are the ones people sometimes don’t even realise exist. If we can educate users on best practices regarding IoT, we can make everyday occurrences that are as simple as their drive to work, their time spent watching television or listening to music via their digital assistants, or even adjusting the temperature in their home ecosystem more safe and secure.  

Just like in 2018, the need for security awareness programs at companies of all sizes will continue to grow in 2019, and the demand to fill these roles will grow as well.

As more attacks continue to happen, additional training around prevention, as well as response, is imperative. Likewise, as the need for training increases, more and more vendors are popping up each day to help fill this security awareness void.

Many of these third-party training and awareness materials can be wonderful supplemental material to a robust and mature security awareness program, but it’s essential that those in the field do diligent research to choose a vendor that is reputable and best meets their company’s needs. 

Security also finally has the ear of the board, and security awareness is a question that is top of mind to most executives. With an extensive amount of cybercrime occurring, more companies are making headlines in a negative light, forcing boards to acknowledge the undesirable recognition a breach can lead to including being front and center in the media which can be damaging to their brand and reputation.

Many of the breaches that occurred during and prior to 2018 could have quite possibly been prevented had a user been given the proper training and tools they needed to be more vigilant. 

There are also additional regulations coming out globally as well as in the US on a state by state basis: these regulations are mandating more restrictions around data privacy and protection of information, thus making the old checkbox approach to security awareness a practice of the past.

All these factors drive the need for security awareness professionals to develop programs that include frequent training and education to keep their companies and their assets secure. 

As an industry, we are continuing to make great strides when it comes to security awareness and education but, unfortunately, the threat actors continue to remain one step ahead. Every aspect of the business needs to be security aware because anyone from the top down, to the bottom up, can become a victim.

In 2019, security teams should empower people to take more control of their own security, not only at work, but at home and not only with themselves, but with their families as well. It is imperative in the coming years that people remain adaptive to the changing events, technologies and threats, and continue to view security awareness and the human factor as a necessary part of any security program.

With this in mind, we as an industry also need to continue to create innovative approaches to engage employees and ensure they are equipped with the knowledge that they need to play an effective role in preventing these attacks in the first place. 

Because after all, you can put all the technology in place but the people will remain a major factor when it comes to securing your company and its assets.

For Cyber staff training please contact us at Cyber Security Intelligence. 

Infosecurity:

You Might Also Read:

Cybersecurity 2019: Predictions You Can’t Ignore!

« US Marines Turn To Artificial Intelligence To Better Deploy Troops
Germany Develops Offensive Cyber Capabilities Without A Coherent Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

YorCyberSec

YorCyberSec

YorCyberSec act as a trusted Cyber and Information Security broker and procurement specialist. We help companies to Reduce Risk, Increase Assurance and Improve Performance.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.