Share

Article

Checklist: Secure IT Behaviour for Your Employees

26 August 2018

The threat from within

According to EY, 60% of CIO's named careless or unaware employees as the most significant increasing vulnerability to organization' security[1]. in 2018, errors were at the heart of almost 1 in 5 security breaches[2], and 42% of companies say their biggest loss of confidential data was by employees[3].

Human error poses a serious threat. Even the most well-intentioned employees can let malware into your network or leak confidential data by accident. Employee behaviour is incredibly difficult to predict the concerns of organisations of all sizes. Furthermore, their use of a plethora of devices outside the network is a challenge for the IT department.

Follow this checklist for secure IT behaviour for your employees:

1. Everyone should know how to inform IT of breaches
Have a guide in place covering typical signs of a breach, who to contact and with clearly defined contact info. If employees are hesitant of sounding the alarm – their awareness has to be exercised so that IT is informed before damage is done.

2. Cultivate suspiciousness
With the daily reception of large volumes of emails, employees are less likely to scrutinize each mail. If something feels out of the ordinary, you should be suspicious as the primary causes of security breaches happen by clicking malicious links and downloading attachments.

3. The sender should be known
Cybercriminals are well financed with the resources to produce quality content for mail fraud (better graphics, personalisation and customised communication) imitating trusted sources. No one should open emails and attachments from unknown senders.

4. Be aware of what is shared
Increased use of social media allows criminals to collect huge amounts of data to be used in personalised messages which are hard to see through. You can’t control what employees share, but you can warn them about the fact that data can and will be abused.

5. Make sure employees allow updates
To skip updates only provides criminals with more elbow space. Make sure employees approve and run software and operating system updates to minimize the risk for malware infection.

 

What you need to do

Educate your employees
The majority of incidents are caused by human error. Social engineering targets individuals and phishing along with ransomware obtain access to your network through employees. Companies with well-trained employees in IT security are less likely to be infected by malware.

Gain control of user rights and access
Who has access to which devices, applications and data? This requires an overview of several roles and limiting the access for selected employees.

Record all rights
During incidents, knowledge of who has access to which part of the organisation can save IT for a lot of time. Time that is better spent remedying.

Monitor continuously and keep network services up to date
Your systems and network change constantly with the flow of employees which requires your overview. Users require new tools, devices and software to be added to your network. It is important to discover system vulnerabilities by monitoring continuously.

Review policies
When you detect vulnerabilities, predicted as well as unpredicted, policies and processes should be reviewed to decrease shadow-IT and the number of access points for malware.

Apply multi-layered security
Errors, especially human errors, will always occur and there is no single solution. Better training of employees goes hand in hand with technology. A multi-layered security e.g. monitoring, endpoint & server protection, backup & recovery, network security and threat management collectively compose the best defence.

 

[2] Verizon Data Breach Investigation Report 2018
[3] Corporate IT Security Risks Survey, Kaspersky Lab and B2B International

Jens Højgaard Pedersen

Written By

Jens Højgaard Pedersen

Cloud specialist focusing on AWS, GCP and automation with many years of operational experience. Certified AWS Solution Architect as well as AWS SysOps.

Find me on

Contact our experts!

More about this topic? Ask your questions now and get a clear answer!

Contact us ››