Contact us today.Phone: +1 888 282 0696Email: sales@aurorait.com

People Management In Cybersecurity

Adopting a people-centric approach to cybersecurity

In October 2023, the CISA-led Cybersecurity Awareness Month celebrated its 20th anniversary. The annual event which premiered in 2004, announced a new cybersecurity awareness program ‘Secure Our World’ (1) to commemorate the milestone. The program aims to embed behavioral change in users across the US in terms of online behavior. The program offers four basic steps that users can follow – from using strong passwords, turning on Multi-Factor Authentication (MFA), recognizing and reporting phishing, and updating software systems.

Why the attention

With almost 80% of the world’s population using the internet or engaging in some online activity (5), and an increasing number of user lapses, it is little wonder that CISA has chosen ‘awareness amongst users’ as the central theme for their campaign. A considerable number of data breach cases in recent times have been attributed to people-related issues like users falling for phishing scams, clicking on suspicious links, and generally following unsafe online behavior.

The examples are legion. The benchmark case perpetrated on tech giants Facebook and Google (4), involved a couple of employees being taken in by a phishing attack that resulted in a loss of USD 100 million (subsequently recovered). The head honcho of a UK energy firm (3) who fell for a deepfake call impersonating his principal, thereby triggering off a loss of GBP 220,000.

The role people play

Over the years, the role of people in cybersecurity has emerged as a major touchpoint. Many experts acknowledge that people are the first line of defense, with their vigilance and awareness. Some research papers have labeled people the ‘weakest link’ in the Information Technology landscape, ‘very likely’, despite security procedures, to expose vulnerabilities.

A claim of this kind would seem justified when one looks at where the user is situated. Most scams invariably originate with some interaction (or lack of it) by the user with the attack vector. But while vigilance and awareness shore up defenses, lack of them literally opens the doors for the attack.

Awareness however is only half the problem says SecurityWeek (2), summarizing the two problem areas as a lack of security awareness among users, and a lack of cybersecurity talent (6).

The complexity of the human interface

It is an inescapable fact that all cybercrimes, in fact, all crimes, are driven by human greed. Cybercriminals are also humans, with the exception that they capitalize on unassuming and uninformed users to perpetrate their crimes. Like users, they too rely on technology, albeit being better steeped in its use. But while greed is their sole motivator, their adversaries – the uniformed users – are driven by greed and other emotions (7) such as fear, curiosity, sympathy, and trust.

It is this range of emotions that can be addressed by awareness and employee training.

The role of training and workforce enhancement

CISA’s Secure Our World guidelines resonate with what the industry feels about user awareness. Both Government and organizations in the public and private space are doing their best to enhance awareness through legislation, best-practice implementation and user training. A trained workforce is always better equipped to respond with alacrity – for threat identification, appropriate action on suspicious activity, reporting of threats, and remediation. Basic training of users could take the form of:

  • Inculcating the need for password management – with a special emphasis on creating and using strong and unique passwords
  • Instilling the ability to recognize and ignore phishing links and suspicious emails/messages from unknown sources
  • Preparing for the latest social engineering tactics including AI-generated deep fakes
  • Reporting of unusual behavior of both computers and colleagues
  • Following best practices for data management in the digital and physical mode

Training cyber professionals is also important. It is touted as one of the most important causes of the cybersecurity talent crisis as professionals are finding themselves ill-equipped to negotiate the mounting challenges of technology. It is recommended that organizations:

  • Make cybersecurity training an ongoing mandatory exercise
  • Partner with security technology vendors for product and applications training
  • Invest and introduce smart working methods and automation to ensure cyber professionals concentrate on core cyber activities, and
  • Adopt and leverage new-age technologies, including AI and ML

The role of technology  

Cybersecurity has evolved considerably from its rather humble beginnings, becoming almost unrecognizable from its early days. Technology has been at the epicenter, with new developments arising at an incredible speed.

Most experts are advocating the following technology measures:

  • Maintaining user rights privilege protocol
  • Multifactor authentication (MFA)
  • Unpatched vulnerabilities monitoring
  • Software and application updating
  • Data encryption
  • Interfacing over VPNs rather than unprotected Wifi systems
  • Identity Access Management (IAM) systems
  • Zero Trust Architecture (ZTA)
  • Integration of AI-based behavioral analytics
  • AI and Machine Learning (ML) for threat detection, and
  • Setting up data loss prevention, damage mitigation, and data recovery measures

The way forward lies in a collaborative approach

Experts are of the view that while user awareness will certainly help, a collaborative approach that involves technology management and user awareness is the answer. CSO Online succinctly calls it a ‘layered approach’ involving people, processes, and technology. Gartner’s top trends for 2023 (9)  advocates that organizations strike a careful balance between technology adoption and human-centric elements if they are to stem the recurrence of cyber incidents. They suggest:

  • Prioritizing the role of employees in the security design
  • Moving away from the conventional approach to technology-driven programs, by placing equal emphasis on people management and technology in the program
  • Shifting IT-related centralized functions to business lines, centers, and individuals

Final words

Adopting a human-centric approach to cybersecurity programs is not new to the industry. In 2015, thought leader Gartner (10) asked the burning question as to whether organizations were ready to implement a People-centric Security System (PCS). Not many had taken cognizance then – with only an estimated 5% of respondents having successfully implemented the concept in their organizations. Five years later, the figure was up to 30%, indicating a dramatic change in the mindset of CISOs and CIOs!

That things are changing as to how organizations are viewing people in the context of the cybersecurity framework, is borne out by these statistics alone. And yes, it certainly resonates with CISA’s newly launched Secure our World program.

References:

 


Contact us at sales@aurorait.com or call 888-282-0696 to learn more about how Aurora can help your organization with IT, consulting, compliance, assessments, managed services, or cybersecurity needs.

Recent Posts