Wednesday, 3 July 2013

Information Security - The Human Element!

Human element of security.jpg
Could you guess the weakest link in Information Security chain? The HUMAN Element! 

It's something technology can't control. "The human being is the most precious asset a company has, and the most dangerous thing" says founder of an international security company in UK. 

I remember a funny incident that an executive manager in one of the largest multinational financial company, while walking on the office floor, noticed a couple of unlocked user PCs. He sent a broadcast email from one PC which says, "Dear All, Today's Lunch is by me (By user X)!" It's a happy message, but here goes the more panic one from another PC... "Dear All, I am resigning from my job with immediate effect! (By user Y)". Ethics behind such messages might be debated, but the moral of the incident is that employees should not leave their desk with unattended pieces of information either digital or in black and white as well. 

Employee awareness on the "Importance of Information Security" need to be addressed efficiently which could be a team effort by HR and Training, IT, Security and Marketing departments. 

Information Security Awareness Training - Current Flaws 

The main problems with how information security awareness techniques are commonly implemented relate to "business culture" and "awareness approach". It's a common assumption that if someone was aware of the risk or threat, then their behavior would change. If you are aware about the presence of attacking dogs, you would take care while walking along those country side roads. The reality is that people may well be aware of the risk but feel constrained by other factors, such as established business culture. 

Another problem is that information security professionals don't realize information security awareness is all about marketing. Mouse mats, motivational posters, screen savers with messages copied from the organization's security policy are quite easy to do, but in reality a creative marketing approach should involve audience research, careful targeting of communications, and measuring the outcome. People part of security implementation always get unattended. The patient is dying of the common cold due to poor nursing, and yet the doctors are concentrating in health of hearts and brains. Yes, the fundamental risks need to be prioritized. 

The problem with managing employees is managing the motivation of the company itself. 

Information Security Awareness Training - A Balanced Approach 

No software or anything in black and white can't stop the spilling of company secrets through mouths of employee. The only solution is to promote real Behavioral Change. It is like the carrot-and-stick model of reward and punishment for behavior. You might push for information security compliance by either punishing bad behavior or rewarding good. The carrot is a better option. The logic is that rewards always motivates! From my personal experience, I have two small kids, and if I buy some chocolates or toys rather than getting a stick, the effect will be healthy and rewarding as well. Same applies in information security awareness training. 

For example, If you are planning to apply the complexity requirements for a windows password, you could either punish or issue warning for those who use simple passwords "name123". On the other hand, you could show example of a strong password and give small rewards to the employees who then follow those examples. What would be your choice? 

What Users Need to Know? 

Users need to know about information security issues that affect their work, their home, themselves and their families. They need to understand the threats and risks as well as the methods they can personally use to defend against these threats. 

To illustrate the Human Element, let's consider an example. You might have noticed stickers in hospitals and other public places illustrating the ideal steps to wash hands... Health authorities and other social services organizations took many years to develop the so-called cultural acceptance of the practice of washing one's hands to prevent infection, because there wasn't an instantaneous negative consequence to not washing the hands. It's the same with information security. When you click an anonymous email or a picture of a fair lady, your computer doesn't immediately blow up; it maybe gets a bit slow. Someone else's information gets stolen, and it never comes back to hurt the individual person. Hope you got the logic! 

Message to Information Security Professionals 

Many organizations are overlooking the security basics in favor of sexy new cyber-attacks most people don't know about. They worry about cyber attacks from China or Russia, but they haven't even fixed the basics that have been broken for years since the conception of the business. Hackers understands very well the "human nature" and its impact on "employee behavior", that's why social engineering and phishing attempts flourishes more than ever before. 

Best Practices

(1) Communicate to users how important is it to them personally: People are more receptive to information that affects them personally. Training should be focused on safe usage not only at workplace, but how it can be used at home as well. 

(2) Communicate with real world examples: Keep everyone's attention by citing examples which audience can identify and realize the impacts. Use any recent public information (internal or external for which consequences could be understood) 

(3) Communicate the importance of End User Security Awareness Efforts: Vulnerabilities are not only exploited from the outside, but also can be exploited from internally as well. Approach security awareness with seriousness and give the users tools to help with security efforts. 

"We're coming around to needing a balance between technological countermeasures and change in behavior countermeasures" says Williamson in (ISC)2, USA. Organizations must decide which user behavior they most care about and focus their efforts to control that risk. 

Security professionals also should examine attitudes and beliefs in their organization, and take a positive approach with a right balance of technology and human element in order to ensure a secure computing environment for the business.

No comments:

Post a Comment