May 22nd, 2024
Contributors: Anagha Anilkumar, Filip Dimitrov, Anup Narayanan
The human factor in cyber security should not be underestimated. A 2020 study from Stanford University found that 9 in 10 (88%) breaches were caused by human error. Still, many cyber security programs focus too heavily on raising awareness and not actually teaching employees how to translate that awareness into actionable skills and behaviors.
Combining awareness with improved cyber security behavior practices will build strong habits across the workforce and significantly improve the organization’s cyber resilience.
This article will outline essential cyber security behavior practices employees should follow to maintain a secure work environment.
The first line of defense for any account or system is a strong password. Unfortunately, weak passwords and credentials are the most common way threat actors gain unauthorized access to systems. They often exploit easily guessable passwords or use techniques like brute force attacks to crack them.
This highlights the critical need for employees to create strong, unique passwords for all work-related accounts and to implement additional security measures such as Multi-Factor Authentication (MFA). Here are some general guidelines for employees when creating work-related passwords:
Business leaders should consider investing in a password manager to improve password security across their organizations. This will make it significantly easier for employees to create and manage strong passwords across multiple accounts.
Phishing is one of the most common attack vectors for hackers. According to Verizon’s 2024 Data Breach Report, phishing accounted for 22% of data breaches globally, only behind compromised credentials.
The most common phishing tactic is email phishing, where attackers send deceptive emails that appear to come from trusted sources. These emails often contain malicious links or attachments designed to trick recipients into providing sensitive information, such as login credentials, financial details, or personal data.
Here are some pointers for detecting and responding to a phishing attack:
Let’s look at an example:
You receive an email from what appears to be your bank stating that there has been suspicious activity on your account and urging you to click a link to verify your information. The email looks legitimate, with the bank’s logo and branding, but upon closer inspection, the sender’s email address is slightly off, such as “customerservice@bank-secure.com” instead of the official domain. The link, when hovered over, directs to a completely different website. Additionally, the email contains spelling mistakes and generic greetings like “Dear Valued Customer.”
When you encounter suspicious emails like these, it’s important to notify your IT or security teams immediately. It’s very likely that other employees have also been targeted.
The internet provides employees with a wealth of information that can help them be more efficient and productive. However, it also exposes your organization to risks like malware and data breaches. If you’re serious about implementing cyber security best practices, avoid visiting suspicious websites and only download files from trusted sources.
Since attackers commonly abuse plugin vulnerabilities, always keep your browser software and plugins up to date.
Let’s face it; mobile devices have become so ingrained in our personal and professional lives, that it’s impossible to simply ban them. Organizations have several options regarding policies for mobile use:
There are pros and cons with each approach, and the best solution will vary depending on the organization. Many tech companies provide COPE, using it as an incentive to attract and retain talent. Regardless of the chosen policy, here are some essential cyber security best practices for using mobile devices securely:
The best way to ensure employees comply with these requirements is by using a mobile device management (MDM) solution. These solutions allow the IT department to enforce security policies, manage device settings, and monitor compliance. MDM can also remotely wipe data from lost or stolen devices, ensuring that sensitive information remains protected.
With so much of our focus shifting to the digital aspect of cyber security, it’s important to protect our physical premises as well. This includes the IT infrastructure, such as workstations, servers, and other valuable assets. Even the most robust digital security protocols can be compromised if physical security is neglected.
Here are the main pointers regarding physical security:
When hosting visitors at the company premises, they should have limited access to restricted areas. Depending on the size of your location, you could also implement a sign-in process where each visitor is recorded and provided with a badge to showcase their legitimacy.
Most cyber security professionals will tell you that it’s not a question of if an incident will happen but when it happens. In such a scenario, timing is crucial. The quicker you react to a potential breach, the better you can mitigate its impact and prevent further damage.
Employees play a critical role in minimizing the impact of security incidents, as they’re usually the first ones to detect them. As soon as suspicious activity is detected, it should be escalated to the appropriate team (typically the IT department) for further investigation.
Every organization should have an established set of protocols, roles, and responsibilities that employees can follow in the event of an incident.
AI assistants like ChatGPT are great tools for boosting productivity and allowing employees to automate menial tasks. However, they should be used responsibly, as several cases of data leakage and information misuse have already surfaced in the media.
The biggest no-go regarding AI use is feeding the tool sensitive information, particularly involving customer data. When providing input, alter the sensitive information to protect privacy and confidentiality.
Before sharing any AI-generated content publicly, carefully review and ensure that it does not contain any sensitive or confidential information.
Employees can be the strongest or weakest link in your organization’s cyber security efforts. By investing in regular cyber security training, employees will start developing more secure habits and cyber security behavior practices.
Remember, effective cyber security begins with each individual’s actions. Stay vigilant and proactive to safeguard against evolving cyber threats, and encourage your colleagues to do the same. A secure work environment is a collective effort that starts with you.
Book a Demo
Get a guided demo of our courses, anti-phishing training, behavior assessments and managed services.