Scroll Top

How End User Cyber Security Training Improves IT Securit?

According to Cisco’s 2018 Security Capabilities Benchmark Study, small-to-medium-sized businesses (SMBs) said they were “most concerned” by targeted attacks, ransomware and Distributed Denial-of-Service (DDoS) attacks.

In a different study (by the Ponemon Institute), SMBs reported that cyber attacks were not just becoming more complex and damaging, but increasingly targeted.

 

SMBs Believe Cyber Attacks are Becoming More Complex and Targeted

perceptions about cyber attacks

        Question: Perceptions about cyber attacks against their companies

        Source: Ponemon Institute via CSR

 

It appears that the “targeted” aspect refers to social engineering, which is a cyber attack type that exploits the user’s lack of awareness about the threat.

For example, many phishing attacks will involve a fake webpage that pretends to be a user login portal of a bank. If the end-user is unable to spot the difference(s), then they are at massive risk of giving up their username and/or password to the attacker.

A related form is spear-phishing. In this, the attacker will send an email to the end-user with a file attachment-based virus or as part of a sophisticated scheme (to get money or information).

In its study, the Ponemon Institute learned that social engineering attacks were by far the most prevalent means of delivering ransomware to SMBs. Spoofed (fake) websites are second.

 

Most Prevalent Methods of Delivering Ransomware to SMBs

How ransomware is unleashed

Source: Ponemon Institute (via CSR)

 

By relying on social engineering, it’s clear that cyber attackers are targeting your employees.

In fact, these attackers are preying on the fact that your staff might not recognize spoofed web pages, malicious attachments, false emails and other tricks.

Having the Right Technology isn’t Enough

You’re entirely correct in believing in antivirus software and firewalls. These technologies help filter-out high-risk or malicious traffic and isolate virus installs from your IT system.

Simply put, antivirus software and firewalls are essential.

But they’re not enough!

The weakest link in any cyber security system, no matter how much is spent on its systems, is its end-user — i.e., your employee(s).

Yes, a next-generation firewall (NGFW) can prevent many fake or suspicious web pages from reaching your staff, but there’s always a risk of something slipping through. If your employees are unable to recognize that page for the threat that it is, they’ll undo your investment in clicks.

You cannot afford any knowledge gaps in your cyber security staff; so, how do we fix it?

Train Your Staff to Block Hackers, Not Let Them In

End User Cyber Security Training for Employees is Key

In our experience, end user cyber security training is the quickest and most cost-effective method of improving your cyber security posture. In effect, training will achieve the biggest cyber security gains in the least amount of time.

To achieve these gains, you must train your staff on the following:

Phishing

The success of a phishing or spear-phishing attack is entirely based on whether the end-user falls for it. So to stop a phishing attack from succeeding, you must train your end-users to not get fooled by them.

For example, they should know how to differentiate false web pages from legitimate ones (e.g., look at the URL, look for security alerts on the URL tab, etc). Regarding spear-phishing, staff should recognize false email addresses or, if they are unsure, know when to verify or escalate suspicious messages instead of interacting with them.

Policies

You should complement your training with processes. Yes, employees have a responsibility to not fall for phishing and spear-phishing attacks, but you can make the situation (for your staff as well as your business) easier by preventing those critical moments where possible.

First, start with a cyber-use policy that prohibits your staff from irresponsibly using corporate IT assets. You should prohibit your staff from browsing on high-risk websites, downloading pirated media, installing unauthorized applications and logging in from unsecured networks.

Second, you should use solutions such as NGFWs to filter traffic from malicious and high-risk sources and, in case of an employee mistake, try and block malicious software installs.

Ultimately, your employees need to understand and accept their limits at the workplace. Once these limitations are in place, you will reduce the amount of potential exposure to cyber risk.

Devices

You should train your employees to know how to take care of company devices.

For example, they should be in the habit of using PIN codes (and, where possible, biometric authentication) keep other users away from their phones and computers. Likewise, in case they lose a device, they should inform your IT department (so that it can remote-wipe those devices).

Passwords

As part of your cyber security training, you must teach your staff to not set weak and predictable passwords, such as “admin” or “123”. Interestingly, even large entities have trouble with this; for example, the data of over 100 people in Equifax was guarded by the password, “admin”.

Not only should you train your employees on passwords, but you should give tools that make it possible to have many strong passwords. Provide them with a password management tool such as LastPass to store their passwords and a Password Strength Checker.

You should also have multi-factor authentication (MFA) in place to serve as last line of defence in case passwords leak or are compromised.

You can train your employees to use MFA to see which logins were legitimate and how to identify suspicious ones (e.g., look for the location or time of the login).

 


Learn More:

First Steps to End User Cyber Security Training

You should start by consulting a company with proven cyber security experience, especially with supporting SMBs in your industry. In this case, your provider will have a curricula in place that it can implement right away.

In addition, you should follow-up your training to ensure that your staff’s security knowledge is also retained. In fact, because the cyber threat landscape is constantly evolving, you must train on a regular (e.g., annual, quarterly, etc) basis. Your new hires will also need to be trained.

In other words, cyber security training should be a regular feature of your company processes. As part of that, you should also run tests — such as simulated phishing or spear-phishing — to both gauge your employees and enable them to understand their own weaknesses, such as our cyber security assessment.

Power Consulting has over 25 years of experience managing the IT needs of SMBs in complex and highly regulated industries. Our IT Security solutions combine cybersecurity systems, processes, and training into one package at a reliable, flat-rate price.

Contact us today to get started.


Learn More: