By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: How can companies improve their cyber hygiene?
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > How can companies improve their cyber hygiene?
Tech News

How can companies improve their cyber hygiene?

By Viral Trending Content 10 Min Read
Share
SHARE

From password reuse to fears of punishment, Arctic Wolf’s Nick Dyer breaks down the biggest threats to an organisation’s cybersecurity culture.

Contents
Supporting the workforceFears of punishmentWorkforce measures

Last month, cybersecurity company Arctic Wolf released a report examining the behaviours and trends of organisations’ workforces in relation to cyber hygiene.

Conducting a global survey with Sapio Research of more than 1,500 senior IT and security decision-makers and end users (whose roles varied from senior and middle management across departments such as finance, HR, legal and marketing) from 16 countries, Arctic Wolf published a number of surprising statistics when it comes to the cybersecurity practices of employees and in particular, IT teams.

One notable statistic reported by Arctic Wolf was that 80pc of IT and cybersecurity leaders were confident that their organisation won’t fall for a phishing attack – despite 64pc of that same cohort admitting to clicking on potential phishing links at least once. While 43pc of end users said they have clicked on a phishing link, the report does point out that end users could be less likely to realise they have done so, or more IT and security leaders are being targeted.

Meanwhile, in one of the most shocking findings of the report, 68pc of IT and cybersecurity leaders surveyed admitted to reusing system passwords, while 64pc of end users admitted to carrying out the practice.

“It’s a worrying oxymoron,” says Nick Dyer, Arctic Wolf’s sales engineering director for the UK and Ireland. “IT and cyber leaders are trusted guardians of their organisation’s critical data, devices and services, they are responsible for protecting and isolating the crucial elements that makes the organisation what it is, and this is done often by giving them privileged or elevated access to these business-critical components.

“By discovering that a significant portion of those same key decision-makers are reusing passwords from key internal to external third-party websites – which could then be subject to a third-party website leak allowing threat actors to reuse those credentials with ease – compromises the security posture of the organisation at the proverbial first hurdle.”

A man wearing a dark grey suit jacket, white shirt and pink napkin smiles at the camera in front of a grey wall.

Nick Dyer. Image: Arctic Wolf

According to Dyer, password credential theft, “brute force” and password reuse are often the easiest ways for threat actors to gain access, exfiltrate confidential data and perform human manipulation for monetary gains.

“It’s no coincidence that in our report that 65pc of those who have experienced four breaches in the past 12 months also said they are re-using passwords.”

Supporting the workforce

With troubling statistics such as these, how can organisations amend poor cyber hygiene in their workforces?

Dyer says that first and foremost, a positive security culture across all employees (not just within IT) along with implementing “well understood” policies and plans. He stresses that a “sensible line” should be drawn between “the rigour of said policies and the art of doing business”, as often the two can conflict and lead to the implementation of shadow IT – which is any software or IT resource used without the IT department’s knowledge or approval.

In terms of education, Dyer says that there should be a continuous programme of awareness education and reinforcement in order to stay up to date with the “cat and mouse” structure of cyberthreats and cyber defence, as threat actor tactics, techniques and procedures are “advancing at a rapid rate”.

“Based on this acceleration, educational content curated six to 12 months ago is already out of date,” he says. “This means much of the content being deployed to user communities today is stale and tends not to protect the latest threats the organisation faces.”

‘The workforce are our biggest asset in the fight against cybercrime when empowered to do the right things’

Fears of punishment

As well as promoting policies and education, Dyer says an important task at hand is building confidence across the entire company to raise the alarm if something suspicious is encountered without fear of punishment.

According to the report, 5pc of end users stated that they weren’t comfortable reporting cybersecurity incidents or suspicious activity. When asked why, 45pc of this cohort said that they were worried it would affect their employment.

It seems this concern is justified, as only 34pc of IT and security leaders said they would rule out termination for an employee who fell victim to a scam such as phishing, while 27pc have terminated an employee for this very reason.

“If end users withhold potentially important information or hesitate/don’t flag something suspicious due to fear of reprimand, the capability of quickly detecting, responding and recovering from an isolated cyber incident is near impossible,” says Dyer. “Not only does this delay the response capability, but in turn escalates the damage caused by the attack beyond the original blast radius.”

The report seems to indicate a disconnect on this topic, as 85pc of IT leaders think employees feel comfortable reporting security incidents – when only 77pc of end users actually do.

In order to build a positive culture of security, Dyer says that pillars of effective communication are required, along with two-way trust and a sense of responsibility for all stakeholders.

“IT and cyber leaders need to step outside of their comfort zone and over-communicate throughout the organisation, using language and terminology that resonates with end users – not deep IT literate technical staff – as well as providing context as to why a risk is prevalent and how a security measure is implemented to prevent it.

“Continually including the end-user in the discussion, from their point of view, is powerful.”

Beyond communication, Dyer says that trust can be built by establishing open lines for support, feedback or reporting incidents without fear of reprimand or blame. “And if there is a security win – publish it and distribute it for all to see and hear – make good cyber practices a force to be celebrated.”

Workforce measures

Reflecting on the disconnect between IT and end users, Dyer says that there will “always be a disparity between the two classes of employees”.

“IT is a core fundamental dependency to allow end users to perform their roles to the best of their ability – delivered as a service for which they consume as customers,” he says. “Users wish to achieve and excel in their employment, and restrictions of IT can be a negative detractor in doing so.

He adds that users are seldom consciously trying to compromise the security of an organisation, and that the incompetence in security hygiene is due to a lack of investment, awareness, engagement or reinforcement.

“It is the job of IT leaders to bridge that gap [and] partner with their respective peers to build a positive security awareness culture where employees feel empowered to speak up if something doesn’t look right and to believe in the mission of effectively securing the organisation from the evolving world of outside and inside threats.”

And to build that culture, Dyer has some advice, such as making policies clearly defined and user-friendly, allowing employees to do their jobs using tech to the best of their ability (with an understanding of the guardrails they have) and instructing them on what to do should something suspicious happen.

In terms of resources, he says that organisations should implement tech such as password managers, multifactor authentication, and allow users to have personal licences to use in their home lives – thus discouraging the copying of passwords from work to home.

“Finally, cybersecurity needs to be a top-down as well as bottom-up approach. An inclusive, positive culture of security only exists when the leaders and board buy in, and talk the same language about business security when IT leaders aren’t in the room.

“The workforce are our biggest asset in the fight against cybercrime when empowered to do the right things.”

Don’t miss out on the knowledge you need to succeed. Sign up for the Daily Brief, Silicon Republic’s digest of need-to-know sci-tech news.

You Might Also Like

Apple AI Pin Specs Leak: Dual Cameras, No Screen & More

The diverse responsibilities of a principal software engineer

OpenAI Backs Bill That Would Limit Liability for AI-Enabled Mass Deaths or Financial Disasters

Google’s Fitbit Tease has me More Excited for Garmin’s Whoop Rival

Why the TCL NXTPAPER 14 Is One of the Best Tablets for Musicians and Sheet Music Reading

TAGGED: cool tech, latest technology, latest technology news, new technology, science and technology, tech, Tech News, tech review, technews, technological advances, technology definition, technology reviews, what is technology
Share This Article
Facebook Twitter Copy Link
Previous Article The Black Friday Magic: The Gathering deals worth shopping before they sell out
Next Article Leaders Barcelona stunned at home by Las Palmas
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
Business
Apple AI Pin Specs Leak: Dual Cameras, No Screen & More
Tech News
A ‘glass-like’ battlefield: German Army chief on the future of warfare
World News
Polymarket Sees Record $153M Daily Volume After Chainlink Integration
Crypto
Natasha Lyonne Then & Now: See Before & After Photos of the Actress Here
Celebrity
Cult Hit Doki Doki Literature Club Fights Removal From Google Play Store Over ‘Depiction Of Sensitive Themes’
Gaming News
Dead as Disco Launches Into Early Access on May 5th, Groovy New Gameplay Released
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
April 10, 2026
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?