4 Ways Mid-Marketers can Make Employees their First Line of Defense Against Cyber Attacks

Mid-market companies continue to invest in security technology to reduce their risk of cyber attacks, but research indicates that employees are their biggest vulnerability.

iStock-535194889-compressorWhile a company could have the best security programs in place, it only takes one employee to open a malicious email or link to circumvent the entire system. Scott Krawitz, founder and CEO of People Driven Solutions, said companies need to put a greater emphasis on employee security training. “Employee awareness is key. Companies may spend tens of millions of dollars to secure their systems, but employees must be trained and educated on the risks,” said Krawitz.

Here are 4 ways mid-market firms can help make employees their first line of defense against cyber attacks.

1. Establish a computing use policy. Mid-marketers need to establish a computing use policy that addresses what types of websites employees are allowed to visit and how their company-owned devices are to be used. Human resources expert Susan Heathfield suggests employers go on record to define what employees can do from work. She recommends that the policy address voicemail, email and Internet usage. “Internet use also creates the possibility of contamination to our system via viruses or spyware…Removing such programs from the company network requires IT staff to invest time and attention that is better devoted to making technological progress,” Heathfield said.

“Removing viruses from the company network requires IT staff to invest time and attention that is better devoted to making technological progress.

A computing use policy can help reduce risks by establishing clear guidelines. In many cases, employee actions can put the company at risk. John Moses, Cisco vice president for the U.S. commercial central area, said 80% of employees use software not cleared by IT departments and many of these programs are considered “high-risk.” The Society for Human Resources offers a sample computing use policy that employers can mimic to establish safe computing practices.

2. Teach employees to spot potential cyber attacks. Employers should educate their staff to identify potential cyber threats. “Phishing” scams, which often come in the form of an email, link or website, are used to trick employees into giving up sensitive information. A 2015 survey by McAfee tested 19,000 computer uses and found that only 3% could identify all phishing scams presented.

Employers can increase their staff’s awareness through regular testing at all levels of the organization, including the C-suite. Symantec found that after a year of testing with one company, the percentage of employees who clicked on phishing links fell by 70%.

“One thing we observed was how positively people reacted to the tests,” said Tim Fitzgerald, Symantec chief security officer. “The more testing we did, the more proud they were of their ability to spot phishing attempts.”

3. Hold regular security meetings. In addition to a formal cybersecurity training program, mid-market companies should hold regular security meetings to identity the latest security risks and promote safe computing practices. Steve Struthers, vice president of security solutions at Dyntek, said employees need regular training and education on the matter and need to create a “culture of security.”

“Regular security meetings are useful for educating staff members on new issues. When new issues arise, the entire company should be involved, even if only on an informational basis,” said Struthers.

4. Require strong password protocols. Many organizations still use systems that allow for weak passwords. Effective passwords should be changed every six months and should include a combination of capital letters, lowercase letters, numerals and symbols.

A 2016 survey by the security firm SailPoint, also found that 65 percent of employees admitted to using the same password in multiple locations. It also found that more than a third had shared their passwords with co-workers while almost half said they could continue to access company documents and files after leaving a job. Kari Hanson, vice president of corporate marketing and communications for SailPoint, said that proper password policies and automated on- and off-boarding procedures can help mitigate some of the risks.


MORE LIKE THIS

  • Get the CEO Briefing

    Sign up today to get weekly access to the latest issues affecting CEOs in every industry
  • upcoming events

    Roundtable

    Strategic Planning Workshop

    1:00 - 5:00 pm

    Over 70% of Executives Surveyed Agree: Many Strategic Planning Efforts Lack Systematic Approach Tips for Enhancing Your Strategic Planning Process

    Executives expressed frustration with their current strategic planning process. Issues include:

    1. Lack of systematic approach (70%)
    2. Laundry lists without prioritization (68%)
    3. Decisions based on personalities rather than facts and information (65%)

     

    Steve Rutan and Denise Harrison have put together an afternoon workshop that will provide the tools you need to address these concerns.  They have worked with hundreds of executives to develop a systematic approach that will enable your team to make better decisions during strategic planning.  Steve and Denise will walk you through exercises for prioritizing your lists and steps that will reset and reinvigorate your process.  This will be a hands-on workshop that will enable you to think about your business as you use the tools that are being presented.  If you are ready for a Strategic Planning tune-up, select this workshop in your registration form.  The additional fee of $695 will be added to your total.

    To sign up, select this option in your registration form. Additional fee of $695 will be added to your total.

    New York, NY: ​​​Chief Executive's Corporate Citizenship Awards 2017

    Women in Leadership Seminar and Peer Discussion

    2:00 - 5:00 pm

    Female leaders face the same issues all leaders do, but they often face additional challenges too. In this peer session, we will facilitate a discussion of best practices and how to overcome common barriers to help women leaders be more effective within and outside their organizations. 

    Limited space available.

    To sign up, select this option in your registration form. Additional fee of $495 will be added to your total.

    Golf Outing

    10:30 - 5:00 pm
    General’s Retreat at Hermitage Golf Course
    Sponsored by UBS

    General’s Retreat, built in 1986 with architect Gary Roger Baird, has been voted the “Best Golf Course in Nashville” and is a “must play” when visiting the Nashville, Tennessee area. With the beautiful setting along the Cumberland River, golfers of all capabilities will thoroughly enjoy the golf, scenery and hospitality.

    The golf outing fee includes transportation to and from the hotel, greens/cart fees, use of practice facilities, and boxed lunch. The bus will leave the hotel at 10:30 am for a noon shotgun start and return to the hotel after the cocktail reception following the completion of the round.

    To sign up, select this option in your registration form. Additional fee of $295 will be added to your total.