Originally published by New Context.
A cyber security culture stems from how an organization communicates the need for security and the technology they provide to enable it. It all starts with awareness, in that employees need to know and understand the rules. Unfortunately, that鈥檚 where a lot of organizations fail. They may have protocols laid out but not focus on helping employees understand why they鈥檙e necessary.
Every single person at an organization needs to feel accountable for , whether they鈥檙e in technical positions or not. To make this easier, organizations can adopt technology that simplifies security while preserving the business value of assets.
There is a common phenomenon that humans exhibit called social proof. Psychologist Robert Cialdini coined the term as one of six principles of persuasion he examined. Simply stated, it means that people will model the behaviors of others when they鈥檙e uncertain about a situation. Like most persuasion principles, it can have a positive or negative effect.
Consider a new employee on his first day at a company. He鈥檚 given a handout that explains the requirements for setting a complex security password for network access. As he鈥檚 about to do that, one of his new coworkers says, 鈥淥h, we all just use 鈥榩assword.鈥欌 That new employee is then far more likely to default to an insecure password because it鈥檚 what everyone else does at the company.
On the upside, when people see others following the standards of a company, they are more likely to do so as well. That is why it鈥檚 so important that upper management establish and model the same security principles that they want to see in their staff.
Another essential part of security awareness is communication. It鈥檚 not enough to tell workers what to do. It鈥檚 vital to explain why it鈥檚 that way. Managers should try to outline how security standards apply to the specific employee. For example, in the password scenario from above, they may bring up a in the past that lead to massive repercussions for the individuals with insecure passwords.
By modeling the behavior they want to see in their workers and communicating the specific reason for security protocols, it鈥檚 far easier to establish a solid cyber security culture. Of course, that only gets the company part of the way there. They must also leverage technology.
听
Very broadly, there are two different kinds of cyber security rules that an organization will deal with: rules enforced through infrastructure and rules established through policy.
Ideally, when an enforced process is feasible, it should be used. Policy-only security protocols should be the exception, not the rule. When used, it鈥檚 essential to audit the system and take remedial action with those not meeting the requirement.
听
Of course, enforced security policies can create some issues when it comes to business value. While the goal is to protect assets, protocols that are too stringent will impede work. They will slow down processes and dissuade employees from completing critical tasks. This is an age-old issue. A task will either be secure, or it will be easy. It鈥檚 also one of the biggest problems with . In the interest of speeding the process, workers bypass necessary security steps. However, this isn鈥檛 an insurmountable issue.
The best solution is to make the complex security protocols easy to follow. Consider a common security standard that a lot of people don鈥檛 enable鈥攎ultifactor authentication. Many times, signing in with the password and getting a texted pin seems like too much trouble for what is protected. Some companies, like Google and Apple, have shifted to using biometric identification as the second method. It鈥檚 simpler for someone to provide their fingerprint or voice to add an additional layer of security, so they鈥檙e more likely to adopt it.
Simplicity for the user is one of the most significant factors to success in building a cyber security culture. When protocols are easy to follow and communicated, company-wide adoption goes up. Individuals are more empowered to take an active role in their organization鈥檚 security without disrupting the flow of business processes, and leaders can have greater peace of mind knowing that valuable information has been treated with the utmost care.
听
听
Level up your Salesforce DevOps skills with our resource library.