SlideShare a Scribd company logo
1 of 2
Download to read offline
Background
Approximately 50 percent of all
security breaches within the Federal
Government are caused by a lack of
user compliance, this is according to
a report released last year by MeriTalk
and developed in collaboration
with Akamai Technologies, Inc.1
This illustrates that even though
security technologies have improved
dramatically during the last few years,
end-user behavior will make or break
any security strategy, as hackers tend
to exploit the path of least resistance.
That is why, in a world where cyber
attacks continue growing at a rapid
pace, organizations wishing to stay
ahead of the game need to mitigate
their biggest cyber threat: naïve end-
users. Otherwise those end-users,
underestimating the magnitude of
their actions, will gladly open the
back door of their organizations to
the world.
1	 MeriTalk, (2013). Half of All Federal Agency
Security Breaches Caused by Lack of User Compliance;
Harsh Security Standards May Lead to More Security
Breaches.
Addressing your
Biggest Cyber
Threat
Part of understanding what an
organization lacks in terms of
awareness, is simply listening to its
end-users. Having their voices heard
will not only increase their satisfaction
as customers, but it will allow for the
identification of gaps in any security
program. For instance, here at the
University of Miami, the IT Security
Department partnered with the
Human Resources Department to
deliver a clear message to our end-
users at the annual benefits fair held
a few weeks ago. We focused this
year’s event on educating our staff
on how to keep both their personal
and work sensitive data safe while
listening to their questions and
concerns. The feedback gathered
will help us develop an action plan
to address any discovered weakness
in the near future. In the end, it is
a simple exercise that can provide
valuable information.
The next goal is to develop a cyber
awareness program that helps
modify the behavior of end-users.
By targeting their behavior rather
than having them memorize specific
procedures, the effectiveness of
the cyber awareness program will
increase, while making them the first
line of defense against most threats.
And given that as human beings we
need to be constantly reminded,
any effort towards cyber awareness
should be a formal and continuous
effort with clear outcomes.
Most experts would agree that in
general end-users are not computer
savvy, an element that makes the
communication process even more
challenging. For that reason, it
is key to avoid technical jargon
that would make some people shy
away. Therefore, employing an easy
vocabulary will open the doors to
Your biggest cyber threat?
Naïve end-users
If your end-users lack awareness, your
sensitive data will be at risk
By: Kelvin O. Medina, Information Security Engineer
University of Miami
AWAR NESS
ST ATEGY
SE URITYC
Y
B
E
R
T
H
R
E
A
T
28 United States Cybersecurity Magazine
reach all levels of an organization.
The National Cyber Security Alliance,
through it’s StaySafeOnline.org
portal, offer a series of free resources
to get started on the right track.
General cyber awareness, while
effective, is only half of the solution to
a bigger problem. According to the
2014 Internet Security Threat Report
reported by Symantec, targeted spear
phishing campaigns have increased
91% when compared to 2013.2
As a consequence, those end-users
with additional privileges within an
organization, now more than ever,
need advanced training based on
their role.
Going Beyond
End-User Awareness
Embedding cybersecurity an
organization’s policies, processes,
and procedures is one-step further
end-user awareness. For instance,
if end-users are able, as many are,
to acquire products and/or services
then this could introduce new
vulnerabilities into the environment.
It is then recommended to establish a
risk assessment process and attach the
same into the acquisition workflow.
This will give organizations an edge
in preventing the introduction of new
vulnerabilities into their information
systems before it becomes too late.
And as a good practice taken from
the systems engineering field, the
earlier cyber security requirements
get taken into consideration during
the System Development Life Cycle
(SDLC), the easier it will be to bring
the project back into compliance.
2	 Internet Security Threat Report 2014. (2014). 1st
ed. [ebook] Mountain View: Symantec Corporation
World Headquarters. Available at: http://www.
symantec.com/content/en/us/enterprise/other_
resources/b-istr_main_report_v19_21291018.en-us.pdf
[Accessed 30 Oct. 2014].
Summing up:
Developing a comprehensive cyber
awareness program is not by any
means a one-person task or even
a responsibility residing within
the technology department of an
organization. It requires the effort
and dedication of many people
with good intentions. From leaders
at the top, to anyone in between,
embracing the awareness message
is everyone’s job.
At the end, it is not all about pouring
resources into new technologies but
coupling them with an organizational
culture that cares. That will determine
to a greater extent, the success of any
security program.
Kelvin O. Medina, CISSP,
SEC+, ITIL, is currently
an Information Security
Engineer at the University
of Miami. He received a
BS in Computer Science
from University of Puerto
Rico and a MS in Technical Management
from the Johns Hopkins University.
Previously, he worked for almost four
years for the US Navy at Dahlgren, VA
as Information Systems Security Officer
(ISSO). In his free time, he enjoys going
to the beach and learning about the latest
in the technology field.	
General cyber
awareness,
while effective,
is only half of
the solution to a
bigger problem.
29United States Cybersecurity Magazine

More Related Content

What's hot

Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
Phishing simulation exercises, by Michael Jenkins
Phishing simulation exercises, by Michael JenkinsPhishing simulation exercises, by Michael Jenkins
Phishing simulation exercises, by Michael JenkinsJisc
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNorth Texas Chapter of the ISSA
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedEnergySec
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology SummitCarahsoft
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident ResponseIBM Security
 

What's hot (18)

Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
Phishing simulation exercises, by Michael Jenkins
Phishing simulation exercises, by Michael JenkinsPhishing simulation exercises, by Michael Jenkins
Phishing simulation exercises, by Michael Jenkins
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 3 - DREAD by Brad Andrews
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
16231
1623116231
16231
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Symantec Government Technology Summit
Symantec Government Technology SummitSymantec Government Technology Summit
Symantec Government Technology Summit
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 

Similar to University-of-Miami_MEDINA

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxSUBHI7
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyOrganization
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfsphinx Worldbiz
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlJose Lopez
 

Similar to University-of-Miami_MEDINA (20)

Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an UncertaintyCyber Security Trends - Where the Industry Is Heading in an Uncertainty
Cyber Security Trends - Where the Industry Is Heading in an Uncertainty
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
The Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdfThe Importance of Cybersecurity in Software Development.pdf
The Importance of Cybersecurity in Software Development.pdf
 
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat ControlBitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
 

University-of-Miami_MEDINA

  • 1. Background Approximately 50 percent of all security breaches within the Federal Government are caused by a lack of user compliance, this is according to a report released last year by MeriTalk and developed in collaboration with Akamai Technologies, Inc.1 This illustrates that even though security technologies have improved dramatically during the last few years, end-user behavior will make or break any security strategy, as hackers tend to exploit the path of least resistance. That is why, in a world where cyber attacks continue growing at a rapid pace, organizations wishing to stay ahead of the game need to mitigate their biggest cyber threat: naïve end- users. Otherwise those end-users, underestimating the magnitude of their actions, will gladly open the back door of their organizations to the world. 1 MeriTalk, (2013). Half of All Federal Agency Security Breaches Caused by Lack of User Compliance; Harsh Security Standards May Lead to More Security Breaches. Addressing your Biggest Cyber Threat Part of understanding what an organization lacks in terms of awareness, is simply listening to its end-users. Having their voices heard will not only increase their satisfaction as customers, but it will allow for the identification of gaps in any security program. For instance, here at the University of Miami, the IT Security Department partnered with the Human Resources Department to deliver a clear message to our end- users at the annual benefits fair held a few weeks ago. We focused this year’s event on educating our staff on how to keep both their personal and work sensitive data safe while listening to their questions and concerns. The feedback gathered will help us develop an action plan to address any discovered weakness in the near future. In the end, it is a simple exercise that can provide valuable information. The next goal is to develop a cyber awareness program that helps modify the behavior of end-users. By targeting their behavior rather than having them memorize specific procedures, the effectiveness of the cyber awareness program will increase, while making them the first line of defense against most threats. And given that as human beings we need to be constantly reminded, any effort towards cyber awareness should be a formal and continuous effort with clear outcomes. Most experts would agree that in general end-users are not computer savvy, an element that makes the communication process even more challenging. For that reason, it is key to avoid technical jargon that would make some people shy away. Therefore, employing an easy vocabulary will open the doors to Your biggest cyber threat? Naïve end-users If your end-users lack awareness, your sensitive data will be at risk By: Kelvin O. Medina, Information Security Engineer University of Miami AWAR NESS ST ATEGY SE URITYC Y B E R T H R E A T 28 United States Cybersecurity Magazine
  • 2. reach all levels of an organization. The National Cyber Security Alliance, through it’s StaySafeOnline.org portal, offer a series of free resources to get started on the right track. General cyber awareness, while effective, is only half of the solution to a bigger problem. According to the 2014 Internet Security Threat Report reported by Symantec, targeted spear phishing campaigns have increased 91% when compared to 2013.2 As a consequence, those end-users with additional privileges within an organization, now more than ever, need advanced training based on their role. Going Beyond End-User Awareness Embedding cybersecurity an organization’s policies, processes, and procedures is one-step further end-user awareness. For instance, if end-users are able, as many are, to acquire products and/or services then this could introduce new vulnerabilities into the environment. It is then recommended to establish a risk assessment process and attach the same into the acquisition workflow. This will give organizations an edge in preventing the introduction of new vulnerabilities into their information systems before it becomes too late. And as a good practice taken from the systems engineering field, the earlier cyber security requirements get taken into consideration during the System Development Life Cycle (SDLC), the easier it will be to bring the project back into compliance. 2 Internet Security Threat Report 2014. (2014). 1st ed. [ebook] Mountain View: Symantec Corporation World Headquarters. Available at: http://www. symantec.com/content/en/us/enterprise/other_ resources/b-istr_main_report_v19_21291018.en-us.pdf [Accessed 30 Oct. 2014]. Summing up: Developing a comprehensive cyber awareness program is not by any means a one-person task or even a responsibility residing within the technology department of an organization. It requires the effort and dedication of many people with good intentions. From leaders at the top, to anyone in between, embracing the awareness message is everyone’s job. At the end, it is not all about pouring resources into new technologies but coupling them with an organizational culture that cares. That will determine to a greater extent, the success of any security program. Kelvin O. Medina, CISSP, SEC+, ITIL, is currently an Information Security Engineer at the University of Miami. He received a BS in Computer Science from University of Puerto Rico and a MS in Technical Management from the Johns Hopkins University. Previously, he worked for almost four years for the US Navy at Dahlgren, VA as Information Systems Security Officer (ISSO). In his free time, he enjoys going to the beach and learning about the latest in the technology field. General cyber awareness, while effective, is only half of the solution to a bigger problem. 29United States Cybersecurity Magazine