FUTURE TALENT November - January 2019/2020 | Page 49
ON TOPIC
train!”), while Adeel adds that HR
should help devise policies that
discourage the use of external
storage devices such as USBs and
portable disk drives, which can be lost
or stolen and are a means of
propagating malware. The advent
of cloud computing and availability of
affordable online storage platforms
has reduced the dependence on
such options.
Bring Your Own Device (BYOD),
where employees deploy their own
device for work and personal use, also
requires clear guidance.
“If you don’t have security in place,
people can access corporate data
through a personal device,” points out
Muttukrishnan Rajarajan, professor of
security engineering at City, University
of London, and director of its Institute
for Cyber Security.
“You can predefine specific
geolocations within which certain
apps can be activated, and you can
ringfence corporate apps with
security.” HR will need to work closely
with IT on this, he adds.
HR should also monitor employee
behaviour, looking for signs that
suggest someone is frustrated or
tempted to harm their employer.
“Watch out for employees on
performance improvement plans or
talking negatively about the company
on external social media platforms,”
advises Jadee Hanson, chief
i n fo r m a t i o n s e c u r i t y of f i c e r
at Code42.
Where people are leaving your
organisation, ensure data or other
sensitive information is not taken out
of the business. A survey by ObserveIT
found that 43% of organisations
globally don’t have a policy that
prohibits staff from taking IP/data with
them when they leave employment,
while in the UK, only 62% take back
physical work devices.
O
The small business experience
When business coach and author Mandie Holgate was hacked
two years ago, it cost her £20,000-£30,000 and left her without
a website for six months. Her two sites – one to promote her
services and the other a business school and networking organisation – were attacked
after a web-design firm she used hosted them on a cheap US-based platform with
minimal security, without her knowledge.
She was alerted when her attempt to send an email resulted in an error message
saying she was sending 500 messages an hour. The hackers had used her email
address to spam people, and within 15 days both sites had been listed on Spamhaus.
“There were about 300 hidden websites on my site, so they were using my ability,
in terms of SEO, to promote other companies,” she recalls. “They damaged the code
so it looked like I was selling things no business owner would ever want to be selling.”
Her first concern was for her customers and business partners (including 10
people who had purchased a licence to trade through the business networking site).
“My saving grace was that I didn’t have any personal details on anything that
wasn’t highly password protected,” she says. “It meant they couldn’t get any further
than destroying my site.”
The reluctance of the web-design company to accept responsibility initially left
her unable to contact the hosting platform. But with the help of another designer
and cyber security company Spritz Monkey, she started the recovery process.
“I learned a lot,” she says. “My concern is that small and large businesses are
employing people to make ‘pretty’ sites which are ultimately not secure.”
S
hould a cyber attack
occur, rather than trying
to hide the issue, it’s vital
to inform customers
quickly and efficiently. Alashe
describes the British Airways’
response as a textbook example of
how to do it well.
“A public statement was issued. All
affected customers were reportedly
contacted in a matter of days. Advice
came clearly and swiftly, as did
financial compensation,” he explains.
“The CEO didn’t shy away from tough
media appearances, and there were
apologies and no excuses.”
Just one individual falling
victim to phishing can be
enough to give criminals
the foothold they need
Organisations may also have to
choose whether to pay ransoms
to regain access to computers and
networks, weighing up the ethical
and practical issues. “Doing so funds
organised crime networks and rogue
nation-state actors,” points out
Alashe. “However, we know that
o rg a n i s a t i o n s d o g i ve i n to
ransomware demands.” There’s no
guarantee that doing so will result
in decryption, however, points
out Hanson.
Such decisions are likely to be
made above HR’s paygrade. But a final
area for HR is to deal with the
repercussions of any breach, taking
action against those who have broken
company policies.
“While a simple warning may be
appropriate in some circumstances,
additional disciplinary action may be
required depending on the severity
of the act and whether it was
malicious or accidental,” says Brown.
“Either way, action must be taken to
reduce the risk of cyber crime
occurring in the future.”
November – January 2019 // 49