Page 52 - Cyber Defense eMagazine July 2024
P. 52

Train General Employees Similarly to Cyber Teams

            Despite the need for cybersecurity  talent, the global shortage  of nearly four million cyber professionals
            makes hiring difficult. This shortage places pressure on understaffed teams, forcing them to do more with
            less and consequently increasing burnout. Short of getting lucky and landing a skilled worker, businesses
            cannot  magically  solve  the  talent shortage  through  hiring  alone.  However,  companies  can bolster  the
            security  competency  of  their  general  employees  to  take  a  load  off  the  shoulders  of  overworked
            cybersecurity teams.

            General employees don't receive sufficient training. The typical security awareness training is little more
            than  watching  videos  and  completing  simple  comprehension  quizzes.  It  should  come  as  no  surprise
            that human error accounts for 95% of cybersecurity issues. Alternatively, businesses should provide the
            same training methods cybersecurity  teams use to everyone else – namely, interactive simulations and
            life-like rehearsals.

            Spontaneous  security  simulations, such as  mock phishing  emails,  will  allow companies  to understand
            their workforce’s security fitness and offer tailored training to those departments that performed  poorly.
            Plus, by using role-relevant training mockups, organizations can arm their people with the proper protocol
            for real incidents, reducing anxiety and instilling confidence.



            Avoid Complexity, Design with People in Mind

            Training  is invaluable  to strengthening  a company’s security  posture.  But if security  processes  are too
            complex  or cumbersome  and not simple to use, no amount of training will encourage  people to spend
            precious minutes trying to resolve an issue. For example,  while employees may know not to click on a
            suspicious  link, they don’t want to spend time confirming  that the link is unsafe. Most likely, they might
            not know how to verify that a link is dangerous beyond their gut instinct.

            Organizations must design security processes to incorporate principles of secure-by-design  and human-
            centered  design.  The  former  approach  places  security  as  a core  business  goal  rather  than  as  some
            technical feature. The latter approach places people at the heart of the solution  – more specifically, the
            designers  are  empathic  toward  the  people  they are  trying to  help. When  dealing  with  shady  links, for
            example, the security team and designers must create a user-friendly link verification solution that is not
            complicated but quick and easy to use, ensuring employees will perceive its value and be encouraged to
            use it to benefit the entire organization.

            Interestingly,  this  trend  toward  human-focused  security  solutions  continues  to  gain  traction. Gartner
            predicts that by 2027, 30% of cybersecurity functions will redesign application security to be consumed
            directly by on-cyber experts and owned by application owners.




            Implement a Zero-Trust Model
            When businesses think about cybersecurity, they might imagine a castle with high walls and a deep moat.
            They build their fortress to repel outsider attackers, often forgetting  the threats lurking inside the walls.




            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          52
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   47   48   49   50   51   52   53   54   55   56   57