FUTURE TALENT November - January 2019/2020 | Page 48
O
ON TOPIC
malicious software – found in 39% of
malware-related cases, according to
research by global communications
and technology company Verizon.
Then there’s the threat of insider
fraud. Verizon reports that more than
half (57%) of database breaches
a re t h e re s u l t of e m p l oye e
activity, accounting for 34% of all
cyber threats.
“In any workplace, the vast majority
of employees will be honest, but a very
small minority may not be,” warns Jim
Gee, partner and national head of
forensic services at risk firm Crowe.
Even inadvertent security breaches
are often down to people, as Alastair
Brown, chief technological officer at
HR software firm BrightHR, admits:
“Employees often present the biggest
danger when it comes to managing
security risks,” he says.
Addressing this involves creating a
culture where employees understand
the need to take cybersecurity
seriously.
Simple preventive measures
recommended by the UK’s National
Cyber Security Centre include
e n s u r i n g p e o p l e u s e s t ro n g ,
memorable passwords for important
accounts (three random words rather
than pets’ names) and secure their
devices (installing software updates,
setting PINs or passwords and only
using official app stores).
Staff should also get to know the
techniques phishers use and think
about the information they make
available online, reporting any security
incidents promptly to their IT team or
line manager.
People act
securely only
when they
care, so make
cyber security
personal
to them
CybSafe’s Alashe says: “People act
securely only when they care, so make
people care; make cyber security
personal to them, gamify it, reward
people who spot phishes and
other insecure behaviours and bring
other leaders onboard. If senior figures
have a dismissive attitude towards
cyber security, that’s going to trickle
down to other employees.”
“Everyone should be trained in
information security awareness,”
stresses ESCP’s Meiller.
“But you must be specific in the
seminars you provide for people,
treating the subject differently
according to whether you’re talking to
those in marketing or finance. You
need examples which are very close
to them.”
Cyber attacks and their consequences
• Cause significant
financial damage:
according to the
2018 Cost of a
Data Breach Study
by Ponemon
Institute, the average
total cost of a data
breach is $3.86m
48 // Future Talent
• Damage brands
and reputations
• Erode or decimate
customer loyalty
• Result in the loss of
intellectual property
• Invite regulatory
penalties
• Impair security
for governments
and states
• Increase potential
for future attacks
• Put some companies
out of business
Initial training needs to take place
during an employee’s induction;
however, in truth, most is ad hoc: 65%
of UK professionals did not receive
mandatory IT training during their first
month’s employment in their current
or most recent role, despite the fact
that 86% of them worked on
a computer every day, according to a
survey by Evaris.
Experts believe that the issue of
cyber security should be broached
during candidate interviews. “This is
rarely adopted outside of technology
roles, but not only would it help with
the selection of suitable candidates, it
would contribute to the development
of a secure-aware company,” says
Deeph Chana, who teaches cyber
security for business executives at
Imperial College Business School.
Muhammad Adeel, a lecturer in
computing at Arden University,
stresses that “due diligence should be
assured in the hiring process, especially
when requesting references from
previous employers”, to reduce the
chances of taking on someone who
may have been involved in a cyber-
security incident previously.
“HR can devise employment
c o n t r a c t s t h a t g i v e s e v e re
consequences to employees in cases
where their policy violations have
resulted in a breach of security, data
loss or a cyber attack,” he adds.
Ideally, organisations would bring
in external specialists to carry out
training, but a shortage of genuine
experts is a challenge, admits Oyku
Isik, professor of information systems
management at Vlerick Business
School. In their absence, “self-paced
digital awareness training, coupled
with frequent and gamified ‘tests’ such
as sending out internally arranged fake
phishing emails, would help create the
necessary awareness that would
significantly reduce the risk of a
breach,” she suggests.
H
R needs to be at the
forefront of developing
p o l i c i e s a ro u n d s afe
working practices. Mobile
working, for example, opens up risk.
Meiller urges HR to remind people of
the key aspects of information security
when travelling for work (“if you’re
working on a calculation to price a
tender, you should not do it on the