Story image

Employees the 'weakest link' within an organisation's cyber security defence

03 Apr 17

Employees are fast becoming the weakest link in the defence against cyber criminals. That’s according to Sean Duca, the vice president and regional chief security officer, Asia Pacific of Palo Alto Networks.

“Successful attacks often involve poor processes or human error. To reduce an organisation’s threat surface, the focus of regular employee training needs to shift from reaction to prevention,” he explains.

“Companies need to put themselves ahead of emerging threats.”

Duca says there are certain ways businesses can protect themselves against such threats. One way, in particular, is incorporating security awareness into the organisational culture.

“Businesses with strong security processes are still vulnerable to innocent mistakes and human error. Employees become agents of a malware attack when they simply click on a link in an email they may have received from an internal team member or outside contact,” he explains.

“Attackers are constantly developing new techniques to break into networks, including targeting employees in areas that may be less aware of the risks.”

Duca adds that it’s incumbent on all employees to take responsibility for their cyber practices, this must include a top down approach. If an executive doesn’t take their security seriously, their employees won’t.

“This includes being aware of the possibility for legitimate websites to be hacked and the increase of compromised websites targeting users with specific interests,” he says.

Another way is for organisations to move beyond a compliance-driven approach.

“Compliance-driven approaches have proven to be ineffective for organisations when used for employee security training. Businesses should focus on educating employees on how to protect their personal data, therefore encouraging employees to enact further security-orientated practices in the workplace,” he explains.

“Gamifying will help make the training process more exciting and engaging for employees, increasing employee awareness of cyber security practices, including how to deal with phishing emails correctly.”

The last way that Duca details, is to limit the number of employees with administrative access.

“Only those with appropriate clearance should be able to access files. Giving all employees blanket access means attackers only need to successfully infiltrate once to have full access to a business’s entire system,” he says.

“By ingraining cybersecurity practices within organisational culture, introducing new ways of training, limiting access to only those with authority, and educating employees to practice safe and secure behaviour online, the cyber risk for businesses can be greatly reduced.”

Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
NBN Co rolls out 'optimised' wholesale business bundles for ISPs
“We recognise some businesses are on nbn powered plans that have not been optimised for their needs," says Paul Tyler.
How Schneider Electric aims to simplify IT management
With IT Expert, Schneider Electric aims to ensure secure, vendor agnostic, wherever-you-go monitoring and visibility of all IoT-enabled physical infrastructure assets.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
Preparing for the future of work – growing big ideas from small spaces
We’ve all seen it: our offices are changing from the traditional four walls - to no walls. A need to reduce real estate costs is a key driver, as is enabling a more diverse and agile workforce.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.