Expectations vs. Reality: Five Ways to Improve Cybersecurity Awareness

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Expectations vs. Reality: Five Ways to Improve Cybersecurity Awareness-2 Next

User Adoption

Expectation: Everybody will do what's right: our people, and the people and organizations we partner with too.

Reality: "Right" doesn't always mean safer. It's often about being cheaper, easier or faster.

Try this: When security teams make better security available, there is a misconception that the rest of the company will quickly and willingly adopt it. Because this is a new domain for many employees, don't judge those who don't understand it. Instead, expose and explain – in layman's terms – security choices, and create avenues to reinforce these values.

Raising awareness and training employees on cybersecurity is hard. It's draining. It's thankless. And all too often, it's ineffective. A big part of the problem is that IT approaches it with unrealistic expectations, and with tactics and messaging that may resonate with them, but not their audience. As a result, there's often a disconnect between the security team's motivations and priorities and those of the rest of the company.

In an ideal world, IT would be recognized by management and co-workers as the esteemed guardians of the system and sage-like purveyors of critical knowledge they clearly are. The reality is a little bit different. However, security experts can take steps to bridge the gap and help to reinforce best practices among their colleagues. In this slideshow, Jack Danahy, co-founder and CTO of Barkly and 25-year veteran of the security industry, has identified steps you can take to improve cybersecurity in your organization.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.