Campus Review Volume 28 - Issue 10 | October 2018 | Seite 29

Technology campusreview.com.au through targeting messages for greater relevance. Schedule messages to send at times when people will see them. 3 Train and reinforce The cyber security landscape is continually evolving – apps, the Internet of Things and more sophisticated threats all add complexity. When staff are your first line of defence, training is the armour they need. Increasing risk awareness and process knowledge, through staff training programs, is the surest way to effect sustained behavioural change. Regular sessions will embed learnings such that they become second nature, as well as ensure any new staff are included. Tip: Maximise attendance by promoting your training sessions in a pop-up RSVP tool. Make your sessions available to remote staff or those who couldn’t attend via video alerts. 4 Share learnings There is a wealth of helpful tips available for better cyber security practice. Staff may have become aware of them in roles at other companies, or through their own web research. Listing every such tip would create an article dozens of pages long! But there is value in sharing best practices – things like how to identify what phishing emails look like (plus examples), or why you need to check the URL of a web link before clicking on it. Not only does this increase the volume of your in-house knowledge, it also helps foster positive learning behaviour. Tip: Establish a collaborative online forum which allows staff to submit cyber security tips (with your IS Manager as moderator). Apply tagging to each such that they may easily be categorised by type (for example, email, procedure, social media) and will appear in related user searches. 5 Define escalation process Cyber security risk is increasing. Networks at some of the top institutions, such as Oxford University, have been compromised. Despite every best effort, sometimes the worst happens. The readiness of your response determines how well you’ll emerge when the dust has settled. Ensure that crisis management procedures are documented, and involve representatives from every department. Tip: Practise your plan with dummy scenarios periodically (after all, you do this for physical exercises like fire drills). Make these as realistic as possible, and ensure all key personnel are involved. 6 Build an online database In protecting your organisation from the risk of cyber attack, you’ll amass a wealth of information – compliance policies, procedures, secure password tips, web browsing guidelines, FAQs and key contacts. Making these available in a single repository not only allows staff to easily access them, it also makes maintenance simpler for you. This area is continually added to over time and becomes the single source of truth for all things cyber security. Tip: Work with your IT team to create a dedicated section on your intranet. Advise staff each time updates are made. Bring cyber security to life by including staff quizzes to test knowledge. 7 Engage students Students introduce a significant element of risk to cyber security. They’re significant users of communal computers, such as those available for use in your library. They’re also likely to be more relaxed about risk – either because they underestimate the danger or are simply indifferent to it. Any tactical plan around cyber security must include the ability to target students – in any faculty, on any campus. Tip: Digital signage in common areas like libraries are highly visible tools that can help promote best behaviour practices. 8 Foster a cyber-safe culture Encouraging a security culture helps your efforts by sharing the responsibility and making everyone part of the solution. This ensures all staff are focused on the risk – particularly important today. Cyber attacks on educational institutions are growing. In the first half of 2017, there was a 103 per cent increase in breaches in the education sector – one of the largest jumps among any industries. A culture of awareness is a culture of preparedness. Tip: Reinforce best practice and promote cyber security tips through passive channels, such as corporate screensavers. Introduce storytelling to your communications via real-world examples. 9 Simulate attacks So, you’ve trained staff on how to act, provided them with the tools to do so, perhaps even tested their knowledge, but how confident are you that they will act in the best way when an attack occurs? The best way of gauging this is to simulate an incident: a phishing email distributed to all staff. The IS team monitor all interactions with it, including how many times dangerous links or attachments are clicked on. Reporting on this, and the specific staff who committed this cyber no-no, helps identify additional training needs before a real event occurs. Tip: Use progressive email testing in your simulations, where content is increasingly difficult to identify as malicious, to help define your potential risk level. 10 Repurpose useful content When it comes to prevention of cyber security risk, don’t reinvent the wheel. A lot of material has been written on the subject already, some of which may be readily available through your institution’s partner network. To assist your ongoing employee education, repurpose content, for example, from your virus-protection vendor, and tailor it for your audience. Physical material can also be made available in student common areas, such as libraries. Tip: Get a list of vendors from your IT department and evaluate which has valuable content that you can make use of. ATTRACTIVE TARGETS As institutes of higher learning, with the personal details of thousands of students on file, universities are expected to exhibit the highest level of cyber security. This becomes increasingly challenging as hackers see the industry as an attractive target. Fortunately, there is much that higher education institutions can do to mitigate against the risk. In this case, a little knowledge is definitely not a dangerous thing. Michael Hartland is an internal communications specialist at SnapComms, a leading global provider of digital employee communication solutions. 27