Interviews

What to do about the dreaded ‘click’

by Mark Rowe

Against cyber-attacks, deploying the right security technologies makes good sense. However, no matter how much technology you deploy, it will never completely replace good common sense. Most cyber-attacks that result in data theft involve the human element, and the dreaded ‘click’. That is, the act of an employee being fooled by a phishing E-mail and ‘clicking’ a link or attachment that installs malicious software without detection. Reducing this single liability would serve to improve anyone’s defensive posture, writes Stephen Gates, Chief Research Intelligence Analyst at the anti-denial of service attack product company NSFOCUS.

Begin with deep-dive training on how cyber-attacks work. Few employees, if any, actually understand the difference between a virus, worm, Trojan, exploit, vulnerability, phishing, smishing, drive by, malvertising, adware, spyware, and ransomware attacks. Educating employees about how cyber-attacks work builds awareness to the constant risk they face from cyber threat actors. If the training is done right, using real-world examples and hands-on scenarios, the likely results would be better educated employees and team building as well. Two benefits for the price of one.

Second, include training on the motivations and tactics attackers utilise and what they are likely to target. Most attackers are motivated by money and understand that gaining access to sensitive data is often like hitting the mother lode. Employees need to recognise the value of sensitive data and understand that it must be protected at all costs. One simple click is all that is needed to compromise a system, gain access, and move laterally in an organisation. Your click may have opened up the passageway for entry into your network. Employees are often the catalyst that results in a data breach.

No-punishment policy

Many cyber-attacks go unnoticed because employees are less than motivated to report suspicious activity on their computers, accounts, and data. Often an employee clicks, something strange happens on their computer, and they’re afraid to report it due to a host of different reasons. Fear of feeling imprudent, the backlash of public ridicule, the violation of Internet usage policies, and other negative outcomes thwarts the sharing of important intelligence. Institute policies that actually reward employees for coming forward, reporting questionable activity, grabbing screen shots, and sharing the steps that were taken during a suspected hack. This valuable intelligence will help security and forensics teams in their investigations, as well as limit the potential damage of the hack.

Monitoring Your Results

Monitoring employees does not often provide the intended result. People try to enforce policies, but they end up looking like the computer police. No one likes to be monitored while online. Instead, set up a test ‘attack process’ with different scenarios. Phish your own employees to see if they’ll click. Tell them ahead of time to expect an attack, and remedial training will be required if they fall for one. If they don’t fall for it, and report the attempt appropriately, publicly reward them for being prudent. Soon you will have employees that are part of the solution, and no longer part of the problem.

About the author

Stephen Gates is a key research intelligence analyst with NSFOCUS IBD. He has more than 25 years of computer networking and security experience with a background in the deployment and implementation.

Related News

  • Interviews

    BSIA awards

    by Mark Rowe

    As ever at its midsummer lunch in London, the British Security Industry Association (BSIA) marked the outstanding work within the security industry…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing