SlideShare uma empresa Scribd logo
1 de 3
THREE TOOLS TO REDUCE EMPLOYEE APATHY
There's a gap between information security awareness and action.
Organizations are spending more time and resources on security awareness training than ever before. In late
2016, Gartner analysts predicted that annual security product and services spending would top $81 billion
globally. Despite the fact that companies are putting budget and hours towards training their people, human
behavior might not be improving.
The 2016 Verizon Data Breach Investigations Report (DBIR) found that human behavior was behind the
majority of security incidents with data loss. Twenty-six percent of employee-caused incidents involved
sending sensitive info to the wrong person. The DBIR also indicated 23% of phishing recipients opened a
malicious email, while 12% of phishing targets went on to open malicious attachments or links.
If humans are receiving all the right knowledge to avoid risky behavior but are still causing security incidents,
what needs to change?
Your Employees May Be Too Apathetic Towards Information Security
When knowledge results in changed behavior, that's action. When knowledge isn't transferred into choices,
it's known as apathy. If you've ever wondered whether apathy is localized to your organization, it may help to
know that some data indicate it's pretty widespread. In 2015, a study by SailPoint indicated that 1 in 5
employees globally would sell their work passwords for the right price—and for some employees, the right
price was as little as $150.
Apathetic employees might not actually hand over their login credentials to cybercriminals, but they're a lot
less likely to pull from their information security awareness knowledge when it comes to daily behaviors.
Apathy isn't a simple issue, and it's also not one that IT can tackle by themselves.
.
Human securitybehavior is not improving even though security and services spending is topping $81 Billion worldwide according to
Gartner Research.Why is this ?
Because there is a pretty large cassium between cyber security awareness and taking action.No action leads to employee apathyand
it is wide spread among mostcompanies.There are few technologycompanies like Securable.io thatworks with many companies to
reduce the apathetic cassum substantiallythrough hands on “justin time” behavior training and awareness.
The 2016 Verizon Data Breach Report state human actions are more than 60 percentof information securityissues.Human factors are
the number one cuase ofinformation securityloss. The reportfurther discuss 26% ofemployees sent delicate information to the
incorrectperson;while twenty three percent opened a malware phishing email.
All this information leads to employees being to apathetic.When the pain exceeds the cos t of change then steps to take action occur.
Thus,when education is not transferred correctly and into actionable choices then this is known as apathy. A 2015 sailpoint study
indicates 20% ofemployees would sell their work passwords for as little as $150.
Detachment / Apathy is not an easy issue to resolve; it is also not one that IT can tackle by themselves. The entire organization need to
be enguaged.At the core is to interlace proactive security behaviors into the companyvalue system
Your People Could Be Too boring Toward Info Security When information ends up in modified behaviour,thatis action. When
information isn'ttransferred into selections,it's known as detachment.If you have ever marvelled whether boredom is local to your
organisation,itmay help to understand thatsome info indicate it's pretty established.In 2015, a study by SailPointpointed to the fact
that one in five staff worldwide would sell their work passwords for the rightpriceand for some staff,the mostattractive p rice was as
little as $150.Boring workers maynot basicallypass over their login recommendations to cybercriminals,butthey are a load less sure
to pull from their info security awareness information when talking ofdailybehaviours.Join us as we review the way to figh t worker
detachmentatyour organisation with collusion,culture,and the right IT technology.One. Join Together with HR to Address
EngagementIssues "Worker engagement"is a term which has received lots of attention in the enterprize managementspace duri ng
the pastyear. 2016 information from Gallup indicates 32% ofstaff in the U.S. Are engaged in their work, which is understood to be
being "concerned in,excited aboutand committed to their work and office. " The drop in average engagementis so grim,Gallu p
researchers are making reference to it as a "crisis." While a dearth of discontentmentwith the office is not really a battle IT can fight
alone,engagementis an IT issue because disengaged workers can exhibitboring behaviours toward security.
If IT leadership were to work with human resources and other functions to boostengagement,whatwould that look like? Deloitte
research suggests improving engagementwith the following actions :Help staff find meaning through work.Raise inspiring and
galvanizing leaders.
Improve office pliability,variety, and inclusiveness.Build chances for expansion.Develop "vision,purpose,and transparency".Headin g
towards more happy,more profitable staff definitely isn'tsomething ITcan achieve alone.But if engagementis nota concern at the
office and security behaviours are suffering,supporting a company-wide movementtowards engagementcould reduce securityrisks .
Join us as we review how to fight employee apathy at your organization with collaboration, culture, and the
right IT technology.
1. Join Forces with HR to Address Engagement Issues
"Employee engagement" is a term that has received a lot of attention in the business management space in
the past year. 2016 data from Gallup indicates 32% of employees in the U.S. are engaged in their work, which
is defined as being "involved in, enthusiastic about and committed to their work and workplace." The drop in
average engagement is so severe, Gallup analysts are referring to it as a "crisis."
While a lack of dissatisfaction with the workplace is hardly a battle IT can fight alone, engagement is an IT
issue because disengaged employees can exhibit apathetic behaviors towards security.
If IT leadership were to work with human resources and other functions to improve engagement, what would
that look like? Deloitte research recommends improving engagement with the following actions:
Help employees find meaning through work.
Elevate encouraging and inspiring leaders.
Improve workplace flexibility, diversity, and inclusiveness.
Establish opportunities for growth.
Develop "vision, purpose, and transparency".
Moving towards happier, more productive employees certainly is not something IT can accomplish on their
own. However, if engagement isn't a priority at the workplace and security behaviors are suffering, supporting
a company-wide movement toward engagement could reduce security risks.
2. Quickly Identify Disgruntled Employees
The vast majority of human error that results in a data breach is caused by apathetic employees who aren't
paying attention or applying their knowledge. However, not all security incidents are a mistake. Disgruntled
employees sometimes cause egregious breaches with intent to behave in criminal ways.
Can apathy lead to disgruntled behavior? With the right mix of cultural and personal elements, it is possible. In
the past few years, unhappy or angry employees have contributed to data loss at organizations like the Korean
Credit Bureau (KCB), Sage, and EnerVest. In the instance of KCB, CNN stated in 2014 an estimated 40% of
Korean citizens were impacted over the course of several years.
To learn more, we recommend 8 Examples of Internal-Caused Data Breaches.
Employees with access to sensitive data, such as members of the IT or leadership team, may present an
elevated risk if they become disgruntled toward their organization. The topic of disgruntled worker risk is
another concept that IT cannot fight alone--it's a company-wide effort that should involve collaboration
between leadership.
However, monitoring logs and identifying unusual behaviors can be an important first step towards mitigating
damage if an employee decides to lash out. Finally, when employees are terminated, IT should work to
remove access immediately, and shut down accounts, to ensure data is not taken off the premises.
3. Use Technology to Support the Right Behaviors
A culture that supports engagement with work and information security is a company-wide mission that
probably can't be accomplished overnight. IT leaders must play an active role in collaborating with HR and
other members of the leadership team in creating a culture that supports happy and secure talent. However,
even at the healthiest organizations, human error, and the occasional disgruntled employee may still be
inevitable.
IT should look towards technologies that can minimize the impact of mistakes or deliberate damage. With the
right technical safeguards, you can protect against mistakes and quickly clean up damages. Technical
safeguards could include:
Policy-based administration for access and identity management
Smart email tools for sandboxing, filtering, and preventing the release of sensitive information
File integrity monitoring to establish accountability
CimTrak Protects
IT can work to educate employees and help resolve cultural issues, but they cannot fix deep-seated issues of
apathy within an organization. Achieving cultural change can be a long process that involves cross-functional
collaboration between tech, HR, and other leadership.
CimTrak is the only FIM solution that allows security administrators to reverse changes in real-time directly
from the management console, allowing you to maintain data integrity.
- See more at: http://blog.cimcor.com/employee-apathy-is-still-one-of-the-top-cyber-security-threats-in-
2017#sthash.3LdKARPO.dpuf

Mais conteúdo relacionado

Mais procurados

BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
 
PINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPinar AKKAYA
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01tjabali
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI ArticleShannon Copeland
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsChristina Lekati
 
Drivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiDrivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiChristina Lekati
 
AI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRAI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRString Business Limited
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceFarooq Omar
 
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Christina Lekati
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2Marius Ghinea
 
Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Revista Esencia de Marketing
 
Investing in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveInvesting in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveCognizant
 

Mais procurados (20)

BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
PINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human Dimension
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI Article
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider Threats
 
Drivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiDrivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina Lekati
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
AI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRAI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HR
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performance
 
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2
 
30 Must Read CIO Bloggers
30 Must Read CIO Bloggers30 Must Read CIO Bloggers
30 Must Read CIO Bloggers
 
The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018
 
Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882
 
Investing in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveInvesting in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity Curve
 

Destaque

English tutor noble park
English tutor noble parkEnglish tutor noble park
English tutor noble parknavstuitions
 
Lettre de motivation et mail d'accompagnement
Lettre de motivation  et mail d'accompagnementLettre de motivation  et mail d'accompagnement
Lettre de motivation et mail d'accompagnementREALIZ
 
Simulated annealing -a informative approach
Simulated annealing -a informative approachSimulated annealing -a informative approach
Simulated annealing -a informative approachRanak Ghosh
 
шеберлік сыныбы
шеберлік сыныбышеберлік сыныбы
шеберлік сыныбыoquzaman
 
3Com 1730-210-000-7.00
3Com 1730-210-000-7.003Com 1730-210-000-7.00
3Com 1730-210-000-7.00savomir
 
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid FilterThe Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid Filterpaperpublications3
 
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image ProcessingA Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processingpaperpublications3
 
Recursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicoRecursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicozoegr
 
SQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer CentreSQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer Centrejatin batra
 

Destaque (14)

Amalan terbaik tugasan 4
Amalan terbaik tugasan 4Amalan terbaik tugasan 4
Amalan terbaik tugasan 4
 
English tutor noble park
English tutor noble parkEnglish tutor noble park
English tutor noble park
 
Lmcr 1532
Lmcr 1532Lmcr 1532
Lmcr 1532
 
Lettre de motivation et mail d'accompagnement
Lettre de motivation  et mail d'accompagnementLettre de motivation  et mail d'accompagnement
Lettre de motivation et mail d'accompagnement
 
Simulated annealing -a informative approach
Simulated annealing -a informative approachSimulated annealing -a informative approach
Simulated annealing -a informative approach
 
шеберлік сыныбы
шеберлік сыныбышеберлік сыныбы
шеберлік сыныбы
 
Computer
ComputerComputer
Computer
 
3Com 1730-210-000-7.00
3Com 1730-210-000-7.003Com 1730-210-000-7.00
3Com 1730-210-000-7.00
 
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid FilterThe Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
 
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image ProcessingA Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
 
constructora vip
constructora vipconstructora vip
constructora vip
 
Recursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicoRecursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogico
 
SQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer CentreSQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer Centre
 
Economics
Economics Economics
Economics
 

Semelhante a Three tools to reduce employee apathy

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarClaudia Warwar
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxaman341480
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxjaggernaoma
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 

Semelhante a Three tools to reduce employee apathy (20)

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docx
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Big Data for Recruiting | SourceIn New York
Big Data for Recruiting | SourceIn New YorkBig Data for Recruiting | SourceIn New York
Big Data for Recruiting | SourceIn New York
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 

Último

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Three tools to reduce employee apathy

  • 1. THREE TOOLS TO REDUCE EMPLOYEE APATHY There's a gap between information security awareness and action. Organizations are spending more time and resources on security awareness training than ever before. In late 2016, Gartner analysts predicted that annual security product and services spending would top $81 billion globally. Despite the fact that companies are putting budget and hours towards training their people, human behavior might not be improving. The 2016 Verizon Data Breach Investigations Report (DBIR) found that human behavior was behind the majority of security incidents with data loss. Twenty-six percent of employee-caused incidents involved sending sensitive info to the wrong person. The DBIR also indicated 23% of phishing recipients opened a malicious email, while 12% of phishing targets went on to open malicious attachments or links. If humans are receiving all the right knowledge to avoid risky behavior but are still causing security incidents, what needs to change? Your Employees May Be Too Apathetic Towards Information Security When knowledge results in changed behavior, that's action. When knowledge isn't transferred into choices, it's known as apathy. If you've ever wondered whether apathy is localized to your organization, it may help to know that some data indicate it's pretty widespread. In 2015, a study by SailPoint indicated that 1 in 5 employees globally would sell their work passwords for the right price—and for some employees, the right price was as little as $150. Apathetic employees might not actually hand over their login credentials to cybercriminals, but they're a lot less likely to pull from their information security awareness knowledge when it comes to daily behaviors. Apathy isn't a simple issue, and it's also not one that IT can tackle by themselves. . Human securitybehavior is not improving even though security and services spending is topping $81 Billion worldwide according to Gartner Research.Why is this ? Because there is a pretty large cassium between cyber security awareness and taking action.No action leads to employee apathyand it is wide spread among mostcompanies.There are few technologycompanies like Securable.io thatworks with many companies to reduce the apathetic cassum substantiallythrough hands on “justin time” behavior training and awareness. The 2016 Verizon Data Breach Report state human actions are more than 60 percentof information securityissues.Human factors are the number one cuase ofinformation securityloss. The reportfurther discuss 26% ofemployees sent delicate information to the incorrectperson;while twenty three percent opened a malware phishing email. All this information leads to employees being to apathetic.When the pain exceeds the cos t of change then steps to take action occur. Thus,when education is not transferred correctly and into actionable choices then this is known as apathy. A 2015 sailpoint study indicates 20% ofemployees would sell their work passwords for as little as $150. Detachment / Apathy is not an easy issue to resolve; it is also not one that IT can tackle by themselves. The entire organization need to be enguaged.At the core is to interlace proactive security behaviors into the companyvalue system Your People Could Be Too boring Toward Info Security When information ends up in modified behaviour,thatis action. When information isn'ttransferred into selections,it's known as detachment.If you have ever marvelled whether boredom is local to your organisation,itmay help to understand thatsome info indicate it's pretty established.In 2015, a study by SailPointpointed to the fact that one in five staff worldwide would sell their work passwords for the rightpriceand for some staff,the mostattractive p rice was as
  • 2. little as $150.Boring workers maynot basicallypass over their login recommendations to cybercriminals,butthey are a load less sure to pull from their info security awareness information when talking ofdailybehaviours.Join us as we review the way to figh t worker detachmentatyour organisation with collusion,culture,and the right IT technology.One. Join Together with HR to Address EngagementIssues "Worker engagement"is a term which has received lots of attention in the enterprize managementspace duri ng the pastyear. 2016 information from Gallup indicates 32% ofstaff in the U.S. Are engaged in their work, which is understood to be being "concerned in,excited aboutand committed to their work and office. " The drop in average engagementis so grim,Gallu p researchers are making reference to it as a "crisis." While a dearth of discontentmentwith the office is not really a battle IT can fight alone,engagementis an IT issue because disengaged workers can exhibitboring behaviours toward security. If IT leadership were to work with human resources and other functions to boostengagement,whatwould that look like? Deloitte research suggests improving engagementwith the following actions :Help staff find meaning through work.Raise inspiring and galvanizing leaders. Improve office pliability,variety, and inclusiveness.Build chances for expansion.Develop "vision,purpose,and transparency".Headin g towards more happy,more profitable staff definitely isn'tsomething ITcan achieve alone.But if engagementis nota concern at the office and security behaviours are suffering,supporting a company-wide movementtowards engagementcould reduce securityrisks . Join us as we review how to fight employee apathy at your organization with collaboration, culture, and the right IT technology. 1. Join Forces with HR to Address Engagement Issues "Employee engagement" is a term that has received a lot of attention in the business management space in the past year. 2016 data from Gallup indicates 32% of employees in the U.S. are engaged in their work, which is defined as being "involved in, enthusiastic about and committed to their work and workplace." The drop in average engagement is so severe, Gallup analysts are referring to it as a "crisis." While a lack of dissatisfaction with the workplace is hardly a battle IT can fight alone, engagement is an IT issue because disengaged employees can exhibit apathetic behaviors towards security. If IT leadership were to work with human resources and other functions to improve engagement, what would that look like? Deloitte research recommends improving engagement with the following actions: Help employees find meaning through work. Elevate encouraging and inspiring leaders. Improve workplace flexibility, diversity, and inclusiveness. Establish opportunities for growth. Develop "vision, purpose, and transparency". Moving towards happier, more productive employees certainly is not something IT can accomplish on their own. However, if engagement isn't a priority at the workplace and security behaviors are suffering, supporting a company-wide movement toward engagement could reduce security risks. 2. Quickly Identify Disgruntled Employees
  • 3. The vast majority of human error that results in a data breach is caused by apathetic employees who aren't paying attention or applying their knowledge. However, not all security incidents are a mistake. Disgruntled employees sometimes cause egregious breaches with intent to behave in criminal ways. Can apathy lead to disgruntled behavior? With the right mix of cultural and personal elements, it is possible. In the past few years, unhappy or angry employees have contributed to data loss at organizations like the Korean Credit Bureau (KCB), Sage, and EnerVest. In the instance of KCB, CNN stated in 2014 an estimated 40% of Korean citizens were impacted over the course of several years. To learn more, we recommend 8 Examples of Internal-Caused Data Breaches. Employees with access to sensitive data, such as members of the IT or leadership team, may present an elevated risk if they become disgruntled toward their organization. The topic of disgruntled worker risk is another concept that IT cannot fight alone--it's a company-wide effort that should involve collaboration between leadership. However, monitoring logs and identifying unusual behaviors can be an important first step towards mitigating damage if an employee decides to lash out. Finally, when employees are terminated, IT should work to remove access immediately, and shut down accounts, to ensure data is not taken off the premises. 3. Use Technology to Support the Right Behaviors A culture that supports engagement with work and information security is a company-wide mission that probably can't be accomplished overnight. IT leaders must play an active role in collaborating with HR and other members of the leadership team in creating a culture that supports happy and secure talent. However, even at the healthiest organizations, human error, and the occasional disgruntled employee may still be inevitable. IT should look towards technologies that can minimize the impact of mistakes or deliberate damage. With the right technical safeguards, you can protect against mistakes and quickly clean up damages. Technical safeguards could include: Policy-based administration for access and identity management Smart email tools for sandboxing, filtering, and preventing the release of sensitive information File integrity monitoring to establish accountability CimTrak Protects IT can work to educate employees and help resolve cultural issues, but they cannot fix deep-seated issues of apathy within an organization. Achieving cultural change can be a long process that involves cross-functional collaboration between tech, HR, and other leadership. CimTrak is the only FIM solution that allows security administrators to reverse changes in real-time directly from the management console, allowing you to maintain data integrity. - See more at: http://blog.cimcor.com/employee-apathy-is-still-one-of-the-top-cyber-security-threats-in- 2017#sthash.3LdKARPO.dpuf