Page 59 - CDM-Cyber-Warnings-March-2014
P. 59
$(-%.1"(-& '$ 4, - (1$6 ++ The way in which businesses operate has changed. Advances in technology such as cloud computing has transformed the way we store and access information. Employees are no longer tied to one location; they can use mobile devices in order to work from home or public places. But these advances can pose risks. Many organisations attempt to safeguard their information assets by securing their business perimeter. Rather than creating a barrier, it is possible to strengthen your business from the inside. In order to combat the challenge of information security, you first need to look to your employees. The human factor It is not necessarily technology that is dangerous; it is the people that use it that pose the danger. Information security threats can come form the negligence of both internal and external users. It is possible to transform these threats into the foundation of your digital security strategy. Employees, if property trained, can act as a human firewall to protect your information assets against potential risks. Education In order for policies to work, employees must firstly understand potential risks as well as their own accountability. There are a variety of methods that companies use to communicate their policies with staff, such as email, Intranet, eLearning and policy management software. But the most effective solution is often the one that successfully engages your employees. Engagement As employees often resent the time and commitment needed to complete training courses, you need to find a method that effectively engages your employees with your message. The learning process can be made more appealing with the introduction of new and interactive media such as webinars, podcasts and videos. For compliance to work it needs to be engaging, understandable and relevant to your employees. " # % " $ " # ! !