Intelligent CIO North America Issue 19 | Page 35

EDITOR ’ S QUESTION
DANNY LOPEZ , CEO , GLASSWALL

With a cyberattack occuring every 39 seconds it is a constant reminder that employers need to take action in order to protect their employees from having their critical information stolen . The solution to preventing incidents like this is twofold : training and technology . Training plays a vital role in any rounded approach to cybersecurity by arming as many users as possible to be alert to risks and follow best practices .

The problem is , much of these training efforts are little more than an exercise in box ticking , covering the basics with employers then assuming their staff will remember what they need to do on every single occasion in the future when they are exposed to risk . People should understand that protecting their organization from the impact of a security breach isn ’ t just about always applying every element of their training on every single occasion , it ’ s also about raising the alarm if a breach may have occurred without fear of punishment .
Whether they are right or wrong , employees should be encouraged to always raise the alarm if something doesn ’ t feel right . On the technology side , taking a proactive , zero trust ( never trust / always verify ) approach to cybersecurity and having the measures in place to prevent attacks from penetrating your systems is critical . It ’ s also far more efficient and cost-effective than relying solely on your employees .

In order to combat ‘ fear fatigue ’ organizations need to empower their people to take small steps toward the bigger goal of bolstering security defenses .

After all , employees play a key role in a company ’ s cybersecurity posture .
A combination of behavioral analytics and smart password practices can help employees , and their employers , stop credential-based attacks and
adversarial lateral movement . Organizations need to ensure they have the right Threat Detection , Investigation and Response ( TDIR ) technologies in place . p
Security teams that shake up their password protocols such as never using the same password twice , using password vaults and enabling multi-factor / adaptive authentication are winning against the adversaries .
Employees play a key role in a company ’ s cybersecurity posture .
TYLER FARRAR , CISO , EXABEAM
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 35