Subido por Denise Moreno

People, process & technology

Anuncio
People, process & technology together
protects an organization against the insider
threat.
As organizations, is necessary start to wake up to the importance of internal security and gain a
better understanding of how to stay secure online in both a personal and a work capacity,
because in the future, the average employee will hopefully be better educated on security.
Security technology will play a big part in this but so will media, culture and education. We will
still need IT solutions to secure data and networks in enterprises, but this better user
understanding should help its effectiveness.
Security has to be a balance of technology and organizational culture. Fortunately, technology
can be used to address culture by helping to educate users and encourage good behavior. An
example of this would be reminding users of policy at opportune times, like when they are
accessing the network outside of normal working hours. If you set up restrictions on network
access that force users to act within the limits of your security policy that should come with
education on why those restrictions are in place. Once users understand they will be more
empowered to follow them of their own conviction.
Presumably, we are tired of hearing or reading the popular phrase:
"A chain is as strong as its weakest link"
Well, in the context of cybersecurity, we can bring the simile of the links considering each of them
as the last and most advanced technological device for prevention, as well as for the protection
of information so, with which one of them fails, security could be compromised. To this
comparison, it should be added that the user is one more link in the chain and possibly the
weakest.
That is why if a company want workers to become a strong link in the chain, it must give them
the importance they deserve. It should be borne in mind that when it comes to truth, it will be
the worker, the end user, the real protagonist, since he will be in charge of managing and using
the information systems of the organization.
But how do I establish a safety culture in my company?
Possibly, developing a culture of safety in an organization may be one of the most complex goals
that can be set. It requires detailed planning and continuous actions over time. It is common for
workers to see a complication, inconvenience, or discomfort in safety protocols.
It is not easy to make employees understand that implementing cybersecurity involves
implementing a series of actions and establishing a way of working aimed at ensuring the security
of information, the main asset of any organization.
Thus, in addition to establishing safety policies, regulations and procedures or monitoring
whether or not good practices are met, you will have to opt for training actions on employee
safety.
Traditionally, organizations have tended to label this type of training as an unnecessary expense
that does not add value to the company, since they do not see it translated into benefits in their
income statement. At most, we will have seen initiatives related to job protection or the
prevention of occupational hazards, but very little related to information security.
But if you attend what is indicated as best security practices, you will realize that it is mandatory,
by a company, to train employees in matters of personal data security that guarantees a correct
management of them.
However, as in many situations, not all workers in an organization will require the same level of
training. This will depend on your assignments or responsibilities. In this way, technical staff will
require a high degree of specialization in security and technologies in this field, while an end user
who only handles a small part of the corporate information, will not require training in technical
aspects, but in the legal and organizational sphere.
In addition, the dizzying evolution in technology requires that technical personnel be in a
continuous process of training, especially if the organization has a high degree of technological
dependence. In short, it will be essential to be aware of the importance of training our workers
in terms of information security. And not only in terms of the protection of personal data, but
also from the point of view of all the information that the organization processes, always taking
into account the responsibilities that each role plays within the organization:
 Properly protect the workstation (antivirus, updates, email, access control by roles, etc).
 Apply physical access controls.
 Treatment and management of compatible media and mobile devices such as laptops,
smartphones, IoT devices.
 Understand the risks associated with using external websites, public Wi-Fi, third-party
applications or downloads and updates not validated by the IT department.
 Learn how to recognize social engineering attacks and how to avoid them.
In security, the possible strategy can be defined from total permissiveness to complete control.
Each company chooses what it allows to do and what it prohibits in its policies.
Having the different policies, rules and procedures, and instructions that are part of the Security
Plan will be the first step in making a record of the importance it has in the way the organization
is made. The second step is to ensure that all employees know and respect them, through
awareness-raising and awareness-raising sessions and drills. Finally, you must provide the
necessary training to those who need it. With all this, you'll have the policies enabled in your
employees' human firewall that will complete the security chain for your company.
Technology
Policies
People
What is the use of all safety measures at work
stations if your employee decides when to follow
the rules?
Descargar