SlideShare a Scribd company logo
1 of 3
THREE TOOLS TO REDUCE EMPLOYEE APATHY
There's a gap between information security awareness and action.
Organizations are spending more time and resources on security awareness training than ever before. In late
2016, Gartner analysts predicted that annual security product and services spending would top $81 billion
globally. Despite the fact that companies are putting budget and hours towards training their people, human
behavior might not be improving.
The 2016 Verizon Data Breach Investigations Report (DBIR) found that human behavior was behind the
majority of security incidents with data loss. Twenty-six percent of employee-caused incidents involved
sending sensitive info to the wrong person. The DBIR also indicated 23% of phishing recipients opened a
malicious email, while 12% of phishing targets went on to open malicious attachments or links.
If humans are receiving all the right knowledge to avoid risky behavior but are still causing security incidents,
what needs to change?
Your Employees May Be Too Apathetic Towards Information Security
When knowledge results in changed behavior, that's action. When knowledge isn't transferred into choices,
it's known as apathy. If you've ever wondered whether apathy is localized to your organization, it may help to
know that some data indicate it's pretty widespread. In 2015, a study by SailPoint indicated that 1 in 5
employees globally would sell their work passwords for the right price—and for some employees, the right
price was as little as $150.
Apathetic employees might not actually hand over their login credentials to cybercriminals, but they're a lot
less likely to pull from their information security awareness knowledge when it comes to daily behaviors.
Apathy isn't a simple issue, and it's also not one that IT can tackle by themselves.
.
Human securitybehavior is not improving even though security and services spending is topping $81 Billion worldwide according to
Gartner Research.Why is this ?
Because there is a pretty large cassium between cyber security awareness and taking action.No action leads to employee apathyand
it is wide spread among mostcompanies.There are few technologycompanies like Securable.io thatworks with many companies to
reduce the apathetic cassum substantiallythrough hands on “justin time” behavior training and awareness.
The 2016 Verizon Data Breach Report state human actions are more than 60 percentof information securityissues.Human factors are
the number one cuase ofinformation securityloss. The reportfurther discuss 26% ofemployees sent delicate information to the
incorrectperson;while twenty three percent opened a malware phishing email.
All this information leads to employees being to apathetic.When the pain exceeds the cos t of change then steps to take action occur.
Thus,when education is not transferred correctly and into actionable choices then this is known as apathy. A 2015 sailpoint study
indicates 20% ofemployees would sell their work passwords for as little as $150.
Detachment / Apathy is not an easy issue to resolve; it is also not one that IT can tackle by themselves. The entire organization need to
be enguaged.At the core is to interlace proactive security behaviors into the companyvalue system
Your People Could Be Too boring Toward Info Security When information ends up in modified behaviour,thatis action. When
information isn'ttransferred into selections,it's known as detachment.If you have ever marvelled whether boredom is local to your
organisation,itmay help to understand thatsome info indicate it's pretty established.In 2015, a study by SailPointpointed to the fact
that one in five staff worldwide would sell their work passwords for the rightpriceand for some staff,the mostattractive p rice was as
little as $150.Boring workers maynot basicallypass over their login recommendations to cybercriminals,butthey are a load less sure
to pull from their info security awareness information when talking ofdailybehaviours.Join us as we review the way to figh t worker
detachmentatyour organisation with collusion,culture,and the right IT technology.One. Join Together with HR to Address
EngagementIssues "Worker engagement"is a term which has received lots of attention in the enterprize managementspace duri ng
the pastyear. 2016 information from Gallup indicates 32% ofstaff in the U.S. Are engaged in their work, which is understood to be
being "concerned in,excited aboutand committed to their work and office. " The drop in average engagementis so grim,Gallu p
researchers are making reference to it as a "crisis." While a dearth of discontentmentwith the office is not really a battle IT can fight
alone,engagementis an IT issue because disengaged workers can exhibitboring behaviours toward security.
If IT leadership were to work with human resources and other functions to boostengagement,whatwould that look like? Deloitte
research suggests improving engagementwith the following actions :Help staff find meaning through work.Raise inspiring and
galvanizing leaders.
Improve office pliability,variety, and inclusiveness.Build chances for expansion.Develop "vision,purpose,and transparency".Headin g
towards more happy,more profitable staff definitely isn'tsomething ITcan achieve alone.But if engagementis nota concern at the
office and security behaviours are suffering,supporting a company-wide movementtowards engagementcould reduce securityrisks .
Join us as we review how to fight employee apathy at your organization with collaboration, culture, and the
right IT technology.
1. Join Forces with HR to Address Engagement Issues
"Employee engagement" is a term that has received a lot of attention in the business management space in
the past year. 2016 data from Gallup indicates 32% of employees in the U.S. are engaged in their work, which
is defined as being "involved in, enthusiastic about and committed to their work and workplace." The drop in
average engagement is so severe, Gallup analysts are referring to it as a "crisis."
While a lack of dissatisfaction with the workplace is hardly a battle IT can fight alone, engagement is an IT
issue because disengaged employees can exhibit apathetic behaviors towards security.
If IT leadership were to work with human resources and other functions to improve engagement, what would
that look like? Deloitte research recommends improving engagement with the following actions:
Help employees find meaning through work.
Elevate encouraging and inspiring leaders.
Improve workplace flexibility, diversity, and inclusiveness.
Establish opportunities for growth.
Develop "vision, purpose, and transparency".
Moving towards happier, more productive employees certainly is not something IT can accomplish on their
own. However, if engagement isn't a priority at the workplace and security behaviors are suffering, supporting
a company-wide movement toward engagement could reduce security risks.
2. Quickly Identify Disgruntled Employees
The vast majority of human error that results in a data breach is caused by apathetic employees who aren't
paying attention or applying their knowledge. However, not all security incidents are a mistake. Disgruntled
employees sometimes cause egregious breaches with intent to behave in criminal ways.
Can apathy lead to disgruntled behavior? With the right mix of cultural and personal elements, it is possible. In
the past few years, unhappy or angry employees have contributed to data loss at organizations like the Korean
Credit Bureau (KCB), Sage, and EnerVest. In the instance of KCB, CNN stated in 2014 an estimated 40% of
Korean citizens were impacted over the course of several years.
To learn more, we recommend 8 Examples of Internal-Caused Data Breaches.
Employees with access to sensitive data, such as members of the IT or leadership team, may present an
elevated risk if they become disgruntled toward their organization. The topic of disgruntled worker risk is
another concept that IT cannot fight alone--it's a company-wide effort that should involve collaboration
between leadership.
However, monitoring logs and identifying unusual behaviors can be an important first step towards mitigating
damage if an employee decides to lash out. Finally, when employees are terminated, IT should work to
remove access immediately, and shut down accounts, to ensure data is not taken off the premises.
3. Use Technology to Support the Right Behaviors
A culture that supports engagement with work and information security is a company-wide mission that
probably can't be accomplished overnight. IT leaders must play an active role in collaborating with HR and
other members of the leadership team in creating a culture that supports happy and secure talent. However,
even at the healthiest organizations, human error, and the occasional disgruntled employee may still be
inevitable.
IT should look towards technologies that can minimize the impact of mistakes or deliberate damage. With the
right technical safeguards, you can protect against mistakes and quickly clean up damages. Technical
safeguards could include:
Policy-based administration for access and identity management
Smart email tools for sandboxing, filtering, and preventing the release of sensitive information
File integrity monitoring to establish accountability
CimTrak Protects
IT can work to educate employees and help resolve cultural issues, but they cannot fix deep-seated issues of
apathy within an organization. Achieving cultural change can be a long process that involves cross-functional
collaboration between tech, HR, and other leadership.
CimTrak is the only FIM solution that allows security administrators to reverse changes in real-time directly
from the management console, allowing you to maintain data integrity.
- See more at: http://blog.cimcor.com/employee-apathy-is-still-one-of-the-top-cyber-security-threats-in-
2017#sthash.3LdKARPO.dpuf

More Related Content

What's hot

BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
 
PINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPinar AKKAYA
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01tjabali
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI ArticleShannon Copeland
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsNewton Day Uploads
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsChristina Lekati
 
Drivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiDrivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiChristina Lekati
 
AI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRAI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRString Business Limited
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersThe Lorenzi Group
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceFarooq Omar
 
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Christina Lekati
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2Marius Ghinea
 
Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Revista Esencia de Marketing
 
Investing in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveInvesting in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveCognizant
 

What's hot (20)

BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
BetterCloud Whitepaper: Offboarding Inefficiencies and Security Threats
 
PINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human DimensionPINAR AKKAYA - The Human Dimension
PINAR AKKAYA - The Human Dimension
 
Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01Competitive advantage through data management terry jabali v.01
Competitive advantage through data management terry jabali v.01
 
Edelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by PonemonEdelman Privacy Risk Index Powered by Ponemon
Edelman Privacy Risk Index Powered by Ponemon
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI Article
 
White Paper - Killing the Shadow Systems
White Paper - Killing the Shadow SystemsWhite Paper - Killing the Shadow Systems
White Paper - Killing the Shadow Systems
 
Protecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider ThreatsProtecting Automotive Intellectual Property from Insider Threats
Protecting Automotive Intellectual Property from Insider Threats
 
Drivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina LekatiDrivers & Enablers of Insider Threats by Christina Lekati
Drivers & Enablers of Insider Threats by Christina Lekati
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
AI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HRAI Whitepapers | Dark art of AI | Putting AI to use in HR
AI Whitepapers | Dark art of AI | Putting AI to use in HR
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
Security Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud ExaminersSecurity Analytics for Certified Fraud Examiners
Security Analytics for Certified Fraud Examiners
 
Artificial intel impacts on organizational performance
Artificial intel impacts on organizational performanceArtificial intel impacts on organizational performance
Artificial intel impacts on organizational performance
 
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
Layer8 Con - Beyond Influence Techniques: Broadening your Social Engineering ...
 
veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2veritas-strike-global-report_a4-sdc2
veritas-strike-global-report_a4-sdc2
 
30 Must Read CIO Bloggers
30 Must Read CIO Bloggers30 Must Read CIO Bloggers
30 Must Read CIO Bloggers
 
The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018
 
Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882Reshaping business with artificial intelligence tcm9 177882
Reshaping business with artificial intelligence tcm9 177882
 
Investing in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity CurveInvesting in AI: Moving Along the Digital Maturity Curve
Investing in AI: Moving Along the Digital Maturity Curve
 

Viewers also liked

English tutor noble park
English tutor noble parkEnglish tutor noble park
English tutor noble parknavstuitions
 
Lettre de motivation et mail d'accompagnement
Lettre de motivation  et mail d'accompagnementLettre de motivation  et mail d'accompagnement
Lettre de motivation et mail d'accompagnementREALIZ
 
Simulated annealing -a informative approach
Simulated annealing -a informative approachSimulated annealing -a informative approach
Simulated annealing -a informative approachRanak Ghosh
 
шеберлік сыныбы
шеберлік сыныбышеберлік сыныбы
шеберлік сыныбыoquzaman
 
3Com 1730-210-000-7.00
3Com 1730-210-000-7.003Com 1730-210-000-7.00
3Com 1730-210-000-7.00savomir
 
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid FilterThe Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid Filterpaperpublications3
 
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image ProcessingA Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processingpaperpublications3
 
Recursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicoRecursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicozoegr
 
SQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer CentreSQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer Centrejatin batra
 

Viewers also liked (14)

Amalan terbaik tugasan 4
Amalan terbaik tugasan 4Amalan terbaik tugasan 4
Amalan terbaik tugasan 4
 
English tutor noble park
English tutor noble parkEnglish tutor noble park
English tutor noble park
 
Lmcr 1532
Lmcr 1532Lmcr 1532
Lmcr 1532
 
Lettre de motivation et mail d'accompagnement
Lettre de motivation  et mail d'accompagnementLettre de motivation  et mail d'accompagnement
Lettre de motivation et mail d'accompagnement
 
Simulated annealing -a informative approach
Simulated annealing -a informative approachSimulated annealing -a informative approach
Simulated annealing -a informative approach
 
шеберлік сыныбы
шеберлік сыныбышеберлік сыныбы
шеберлік сыныбы
 
Computer
ComputerComputer
Computer
 
3Com 1730-210-000-7.00
3Com 1730-210-000-7.003Com 1730-210-000-7.00
3Com 1730-210-000-7.00
 
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid FilterThe Harmonic Mitigation in Induction Furnace Using Hybrid Filter
The Harmonic Mitigation in Induction Furnace Using Hybrid Filter
 
A Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image ProcessingA Review over Different Blur Detection Techniques in Image Processing
A Review over Different Blur Detection Techniques in Image Processing
 
constructora vip
constructora vipconstructora vip
constructora vip
 
Recursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogicoRecursos y herramientas con un uso pedagogico
Recursos y herramientas con un uso pedagogico
 
SQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer CentreSQL Training Institute in Ambala ! Batra Computer Centre
SQL Training Institute in Ambala ! Batra Computer Centre
 
Economics
Economics Economics
Economics
 

Similar to Three tools to reduce employee apathy

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityDavid X Martin
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsClickSSL
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarClaudia Warwar
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxaman341480
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013EY
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNAaccenture
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapDominic Vogel
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxjaggernaoma
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 

Similar to Three tools to reduce employee apathy (20)

Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
Cultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurityCultivate a stronger corporate culture to enhance cybersecurity
Cultivate a stronger corporate culture to enhance cybersecurity
 
Empower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security SkillsEmpower Business by Filling Gap of Cyber Security Skills
Empower Business by Filling Gap of Cyber Security Skills
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
I-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia WarwarI-Week April 2004 - Claudia Warwar
I-Week April 2004 - Claudia Warwar
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docx
 
Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013Under cyber attack: EY's Global information security survey 2013
Under cyber attack: EY's Global information security survey 2013
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
Atha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docxAtha Corporation[Type text]To All EmployeesCC Exec.docx
Atha Corporation[Type text]To All EmployeesCC Exec.docx
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Big Data for Recruiting | SourceIn New York
Big Data for Recruiting | SourceIn New YorkBig Data for Recruiting | SourceIn New York
Big Data for Recruiting | SourceIn New York
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Three tools to reduce employee apathy

  • 1. THREE TOOLS TO REDUCE EMPLOYEE APATHY There's a gap between information security awareness and action. Organizations are spending more time and resources on security awareness training than ever before. In late 2016, Gartner analysts predicted that annual security product and services spending would top $81 billion globally. Despite the fact that companies are putting budget and hours towards training their people, human behavior might not be improving. The 2016 Verizon Data Breach Investigations Report (DBIR) found that human behavior was behind the majority of security incidents with data loss. Twenty-six percent of employee-caused incidents involved sending sensitive info to the wrong person. The DBIR also indicated 23% of phishing recipients opened a malicious email, while 12% of phishing targets went on to open malicious attachments or links. If humans are receiving all the right knowledge to avoid risky behavior but are still causing security incidents, what needs to change? Your Employees May Be Too Apathetic Towards Information Security When knowledge results in changed behavior, that's action. When knowledge isn't transferred into choices, it's known as apathy. If you've ever wondered whether apathy is localized to your organization, it may help to know that some data indicate it's pretty widespread. In 2015, a study by SailPoint indicated that 1 in 5 employees globally would sell their work passwords for the right price—and for some employees, the right price was as little as $150. Apathetic employees might not actually hand over their login credentials to cybercriminals, but they're a lot less likely to pull from their information security awareness knowledge when it comes to daily behaviors. Apathy isn't a simple issue, and it's also not one that IT can tackle by themselves. . Human securitybehavior is not improving even though security and services spending is topping $81 Billion worldwide according to Gartner Research.Why is this ? Because there is a pretty large cassium between cyber security awareness and taking action.No action leads to employee apathyand it is wide spread among mostcompanies.There are few technologycompanies like Securable.io thatworks with many companies to reduce the apathetic cassum substantiallythrough hands on “justin time” behavior training and awareness. The 2016 Verizon Data Breach Report state human actions are more than 60 percentof information securityissues.Human factors are the number one cuase ofinformation securityloss. The reportfurther discuss 26% ofemployees sent delicate information to the incorrectperson;while twenty three percent opened a malware phishing email. All this information leads to employees being to apathetic.When the pain exceeds the cos t of change then steps to take action occur. Thus,when education is not transferred correctly and into actionable choices then this is known as apathy. A 2015 sailpoint study indicates 20% ofemployees would sell their work passwords for as little as $150. Detachment / Apathy is not an easy issue to resolve; it is also not one that IT can tackle by themselves. The entire organization need to be enguaged.At the core is to interlace proactive security behaviors into the companyvalue system Your People Could Be Too boring Toward Info Security When information ends up in modified behaviour,thatis action. When information isn'ttransferred into selections,it's known as detachment.If you have ever marvelled whether boredom is local to your organisation,itmay help to understand thatsome info indicate it's pretty established.In 2015, a study by SailPointpointed to the fact that one in five staff worldwide would sell their work passwords for the rightpriceand for some staff,the mostattractive p rice was as
  • 2. little as $150.Boring workers maynot basicallypass over their login recommendations to cybercriminals,butthey are a load less sure to pull from their info security awareness information when talking ofdailybehaviours.Join us as we review the way to figh t worker detachmentatyour organisation with collusion,culture,and the right IT technology.One. Join Together with HR to Address EngagementIssues "Worker engagement"is a term which has received lots of attention in the enterprize managementspace duri ng the pastyear. 2016 information from Gallup indicates 32% ofstaff in the U.S. Are engaged in their work, which is understood to be being "concerned in,excited aboutand committed to their work and office. " The drop in average engagementis so grim,Gallu p researchers are making reference to it as a "crisis." While a dearth of discontentmentwith the office is not really a battle IT can fight alone,engagementis an IT issue because disengaged workers can exhibitboring behaviours toward security. If IT leadership were to work with human resources and other functions to boostengagement,whatwould that look like? Deloitte research suggests improving engagementwith the following actions :Help staff find meaning through work.Raise inspiring and galvanizing leaders. Improve office pliability,variety, and inclusiveness.Build chances for expansion.Develop "vision,purpose,and transparency".Headin g towards more happy,more profitable staff definitely isn'tsomething ITcan achieve alone.But if engagementis nota concern at the office and security behaviours are suffering,supporting a company-wide movementtowards engagementcould reduce securityrisks . Join us as we review how to fight employee apathy at your organization with collaboration, culture, and the right IT technology. 1. Join Forces with HR to Address Engagement Issues "Employee engagement" is a term that has received a lot of attention in the business management space in the past year. 2016 data from Gallup indicates 32% of employees in the U.S. are engaged in their work, which is defined as being "involved in, enthusiastic about and committed to their work and workplace." The drop in average engagement is so severe, Gallup analysts are referring to it as a "crisis." While a lack of dissatisfaction with the workplace is hardly a battle IT can fight alone, engagement is an IT issue because disengaged employees can exhibit apathetic behaviors towards security. If IT leadership were to work with human resources and other functions to improve engagement, what would that look like? Deloitte research recommends improving engagement with the following actions: Help employees find meaning through work. Elevate encouraging and inspiring leaders. Improve workplace flexibility, diversity, and inclusiveness. Establish opportunities for growth. Develop "vision, purpose, and transparency". Moving towards happier, more productive employees certainly is not something IT can accomplish on their own. However, if engagement isn't a priority at the workplace and security behaviors are suffering, supporting a company-wide movement toward engagement could reduce security risks. 2. Quickly Identify Disgruntled Employees
  • 3. The vast majority of human error that results in a data breach is caused by apathetic employees who aren't paying attention or applying their knowledge. However, not all security incidents are a mistake. Disgruntled employees sometimes cause egregious breaches with intent to behave in criminal ways. Can apathy lead to disgruntled behavior? With the right mix of cultural and personal elements, it is possible. In the past few years, unhappy or angry employees have contributed to data loss at organizations like the Korean Credit Bureau (KCB), Sage, and EnerVest. In the instance of KCB, CNN stated in 2014 an estimated 40% of Korean citizens were impacted over the course of several years. To learn more, we recommend 8 Examples of Internal-Caused Data Breaches. Employees with access to sensitive data, such as members of the IT or leadership team, may present an elevated risk if they become disgruntled toward their organization. The topic of disgruntled worker risk is another concept that IT cannot fight alone--it's a company-wide effort that should involve collaboration between leadership. However, monitoring logs and identifying unusual behaviors can be an important first step towards mitigating damage if an employee decides to lash out. Finally, when employees are terminated, IT should work to remove access immediately, and shut down accounts, to ensure data is not taken off the premises. 3. Use Technology to Support the Right Behaviors A culture that supports engagement with work and information security is a company-wide mission that probably can't be accomplished overnight. IT leaders must play an active role in collaborating with HR and other members of the leadership team in creating a culture that supports happy and secure talent. However, even at the healthiest organizations, human error, and the occasional disgruntled employee may still be inevitable. IT should look towards technologies that can minimize the impact of mistakes or deliberate damage. With the right technical safeguards, you can protect against mistakes and quickly clean up damages. Technical safeguards could include: Policy-based administration for access and identity management Smart email tools for sandboxing, filtering, and preventing the release of sensitive information File integrity monitoring to establish accountability CimTrak Protects IT can work to educate employees and help resolve cultural issues, but they cannot fix deep-seated issues of apathy within an organization. Achieving cultural change can be a long process that involves cross-functional collaboration between tech, HR, and other leadership. CimTrak is the only FIM solution that allows security administrators to reverse changes in real-time directly from the management console, allowing you to maintain data integrity. - See more at: http://blog.cimcor.com/employee-apathy-is-still-one-of-the-top-cyber-security-threats-in- 2017#sthash.3LdKARPO.dpuf