People and Cyber Security – The Importance of Embedding a Security Strategy

peoplecybersecurity-1230x532.jpg

When news breaks around a data breach or a cyber security incident, people immediately think about systems and computers being hacked, but what about people? People manage the physical and technical estates, they define the business processes, they code software, and they welcome visitors in to an office. They are also the best line of defence. With that in mind how does an organisation reduce the risk of its people being hacked? 

Eliminate negligence 

Post GDPR, people are now more aware of the importance of protecting data and the risk of sanctions from the ICO. Yet, negligence is still cited as the primary cause of data breaches within the work place. This is often due to the loss of devices in their charge, or failure to follow an agreed process. 

Many organisations took a policy based approach to GDPR to ensure staff knew about the risks and monitored that policies were read. They also ensured 3rd party systems were compliant (as best they could be due to age).  

The question to ask 18 months later is; are the policies still being followed and have they been embedded into process with the organisation 

The IT usage policy may have been amended to stop the use of USB sticks, but is a policy in place to restrict staff from emailing files to personal email accounts? 

It may also require staff to ensure computers are locked when they are away from their desks, is this left to trust? Or have IT enforced a policy to lockout unattended machines after 2 minutes. 

A 2017 report by Kensington suggested that one laptop is stolen every 53 seconds, and over 70 million cell phones are lost each year. This means that the Friday night end of week drinks’, where employees may leave their bags containing company equipment unattended, is a clear and present dangerIf a device is stolen, how secure is it and can data be wiped remotely?  

Preparing people for malicious attacks 

So far, these examples have been technology focusedSo, what is the State of the Nation when it comes to ‘people’ related cyber-attacks? 

According to the banking trade body UK Finance, there is a lack of awareness of the dangers of invoice fraud with around four out of 10 businesses unaware. Around 3,280 invoice and bank mandate scams were reported in 2018, with the average cost per case equating to £28,000. 

The obvious danger here is the rise in fraudulent (phishing) emails sent to organisations. These vary from the obvious (with typos and broken English), to the more sophisticated where publicly available information, such as staff names, are introduced in the text to appear more genuine. 

The main defence for organisations here is always process and due diligence. If an email is received which requires a change of bank details then it pays to verify via another source, such as the telephone. The process to change bank details should also require a form of verification. 

What about where a threat presents itself IRL (in real life)? A technique known as social engineering doesn’t require technology, it just requires confidence. This is more opportunistic and could involve someone entering a building via tailgating and using a plausible cover story to enter an office and then steal trophies. Mitigating this is about encouraging staff to challenge unknown visitors and ensuring that items of value are protected. 

The insider threat 

It is also extremely prudent to mitigate against the risk of an ex-employee with a grudge. In 2014, an ex-employee of Morrisons stole company data which included the salary and bank details of circa 100,000 staff. The staff brought a claim against the company, and Morrisons lost its challenge to the High Court ruling. 

How does an organisation begin to mitigate this? Firstly, there should be business rules around who can access data, and what data that individual is required to access as part of their role.  

A robust staff exiting process is mandatory and should be built around all systems that an organisation uses to ensure access accounts are locked when the employee parts ways. Some accounts, such as social media, may have a shared password, so this would require a password change. 

Why should an organisation embed a Security Strategy?  

As with most business problems, understanding the WHY, and building a strategy around it is key. This blog has identified the importance of people in a security strategy, and the key tactics should be focused on awareness 

review of processes to identify gaps and a robust training programme to raise awareness are a strong starting point to protect your organisation. Also ensure that intelligence is gathered for all breaches and that remedial actions are acted upon. 

About the Author

nick-david-108x108.png
Nick David
Executive Consultant

As an Executive Consultant at Equantiis, Nick is responsible for helping clients solve challenging problems. Formally the Head of Digital at the Royal Pharmaceutical Society, Nick has over 17 years cross sector experience across digital transformation and strategy, ecommerce and website, digital marketing, insight, and cyber security. He has worked across a number of not-for-profits and commercial organisations, including the British Heart Foundation, Turning Point, and Home Learning College focusing on digital. As part of the Cyber Security Practice, Nick works with clients to strengthen their security posture and strongly believes that raising awareness across an organisation is key, and not just leaving it to IT.

News & Events

Latest News & Upcoming Events

cybersecurityleaders-399x254.jpg
Latest News
What have we learnt from GDPR two years on?

We are fast approaching the two year anniversary of the

RPA-HE-399x254.jpg
Latest News
Robotics Process Automation – What’s in it for you?

Robotics Process Automation – what’s in it for you? Robots!

Alistair-399x254.jpeg
News
Digital transformation consultancy Purple rebrands to Equantiis

In a bid to improve how it helps businesses overcome challenges, digital consultancy Purple has rebranded to Equantiis.