“Another awareness training…”

Organizations should implement frequent human factors trainings to shape and mold your associate attitudes towards cybersecurity and the human impact on cyberattacks.

Francesca Ussani (WMIT), CC BY-SA 4.0 https://creativecommons.org/licenses/by-sa/4.0, via Wikimedia Commons

“When you are laid off, but remember you still have access to your user profile.”

Organizations should monitor insider threats. Disgruntled employees misusing credentials can lead to a major financial loss and a damaged reputation. Monitoring recently let go and terminated employees can aid in detecting insider threats.

Photo by Brooke Cagle on Unsplash

“Posting your vacation pictures live from Aspen, think again!”

People often are unaware that their everyday online activity can place themselves or others in physical danger.

Denali National Park and Preserve, Public domain, via Wikimedia Commons

“Religiously locking my computer before I walk away from it.”

Humans are the weakest link. Risky behaviors such as leaving your computer unlocked creates a physical security concern, resulting from human error. Cybersecurity programs should include enforced password policies backed by the rules for breaking it.

User:cth103_t, CC BY-SA 2.0 https://creativecommons.org/licenses/by-sa/2.0, via Wikimedia Commons

“When you finally beat the phishing simulator game.”

Phishing is a cyberattack that exploits human vulnerability. Organization should use phishing simulators to monitor and detect employees that have an increased likelihood of being victimized.

Photo by Ghen Mar Cuaño on Unsplash

“Bring on the stress!”

Employees tend to bring all of themselves to work, which includes external stressors. Keep a rapport and monitor your associates to be able to identify shifts in performance and policy compliance, to minimize security fatigue.

Photo by Headway on Unsplash

“When your job finally allows BYOD and remote work options.”

Organizations offering bring your own device and remote work to boost employee morale. Increasing employee morale can lead to a lowered turnover rate, this reduces the need to hire new employees. However, BYOD and remove work options do leave the door open for greater cyber threats.

Photo by Avi Richards on Unsplash

“Finally using my Psychology degree for a career in cybersecurity.”

Cybersecurity is an interdisciplinary problem that require professionals with different disciplinary backgrounds such as Psychology, Communications, and Sociology.

Photo by Cookie the Pom on Unsplash

“We all have our Zoom interview sweater.”

Due to the pandemic many hiring departments had to shift from in person to zoom interviews and online hiring. It is important to vet and background check your staff. It is important to make sure you have the right people working for you as they will have some level of access to the organization’s sensitive data.

Photo by Christin Hume on Unsplash

“Casually ignoring the ios update to scroll Instagram.”

You can have top of the line software installed, but it is ultimately up to the person at the end of the device to interpret the alerts and take action. Updates and backups are often ignored or forgotten about. Ignoring backups and updates can leave a greater opportunity for hacking, which is avoidable.

Photo by Erik Mclean on Unsplash

Facebooktwitterlinkedininstagramflickrfoursquaremail