Interviews

Unaware users – your weakest link?

by Mark Rowe

Are employees unwittingly the weakest link for organisational security? asks Paul Kenyon, COO, Avecto, pictured.

As the sophistication of malware evolves and organisations face an increasingly tumultuous threat landscape, heavy investments are continually made for new security controls, policies and best practices. Yet, one critical – but avoidable – flaw remains. The human aspect of IT practice is a key weakness for most organisations, and the vast majority of today’s breaches continue to stem from internal end-user error, rather than external attacks In fact, among 308 security breaches examined in the latest Information Security Trends study by CompTIA , 54 per cent were caused by human error, and nearly half of those errors were attributed to end-users’ failure to follow company security policies.

When employees allow suspect malware to go unnoticed, even by unwittingly running an html link hosting infected content, or simply opening an email attachment, the consequences could be devastating. Take the case of South Carolina’s recent Department of Revenue breach , for example. An employee who unknowingly clicked an email link opened the government agency to a large-scale cyber-attack. This simple mishap cost the state $14 million and compromised the personal and financial data of millions of residents.

Cyber-criminals recognise that users with excess privileges, particularly those who lack the resources to identify and report an attack, are ripe for malware’s intrusion. As organisations come to realise this, there are a couple of options to consider. Locking down all administrative privileges is one, but when rights are too restrictive, employees are left struggling to perform day-to-day tasks. Organisations are left grappling for ways to empower users with the privileges they need to perform their roles, without compromising network security.

To strike this balance, organisations are increasingly adopting the methodology of least privilege management , granting privileges to applications instead of users, and elevating those privileges only when needed. By restricting certain actions, such as blocking the ability to make system tweaks, or preventing the installation of unsanctioned software, human errors can be prevented.

Of course, a key component of combating human error is end-user education, and this involves talking to users. With customised messaging , IT can communicate appropriate messages to users based on their activity. Messages might, for example, provide the user with additional information, such as warning the user of their actions or blocking an application from running. This way, users know and understand exactly what risks they’re encountering. Adding in corporate branding, localisation, end-user reason or request and help desk integration, user experience is heightened, and communication feels truly human.

No matter how well an organisation is able to safeguard its enterprise assets, unaware users are a hidden vulnerability that could breach even the most impenetrable defenses. End-user experience is at the heart of endpoint security, and organisations should establish an environment in which employees have clear feedback and guidance on their actions. With a software solution in place to incorporate user interaction for ongoing security awareness, IT can ensure their users are productive, while their network is safe.

Visit www.avecto.com

Related News

  • Interviews

    Legal benchmarking

    by Mark Rowe

    Near a quarter, 24 per cent, of firms experienced a fraud-related loss or cyber-attack in the last year; small firms slightly more…

  • Interviews

    Football anti-racism

    by Mark Rowe

    In our March 2015 print issue we featured a report by the Community Security Trust (CST), which provides security advice for Britain’s…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing