Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • IT Management

    How to Avoid the Fate of Sony, Target or Home Depot in 2015

    Written by

    Wayne Rash
    Published December 27, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      These days my email is full of press releases from IT vendors that claimed their products are the magic bullet that will prevent the next Sony data breach. But the reality is, there is no magic bullet.

      But that doesn’t mean you can’t keep your company from being a victim of cyber-criminals—because you can. But there is no magic bullet. And it’s important to realize that some breaches may be all but impossible to stop, but those should be a small minority.

      First, it’s important to know that while you can’t totally solve the data breach problem with technology, you should still keep using the available technology—including firewalls, email screening appliances, anti-malware and similar products—to keep things under control. They do help. By using the best of the available products, you can at least keep most of the bad stuff out of your network so you can focus on the rest.

      Second, it’s important that you not buy into the dismissal of employee errors by calling them “stupid user tricks” and then throw up your hands in dismay. While nearly all major breaches were the result of an error made by a trusted employee or contractor, it’s wrong to suggest that they’re somehow stupid and therefore unpreventable.

      “They’re just highly trained people in another field,” said KnowBe4 CEO Stu Sjouwerman. But it’s wrong to simply pass off these security problems as being the unavoidable problem of stupid users. “The stupid user might be a highly trained CFO,” Sjouwerman said.

      His point is that many of the employees in your company aren’t trained in IT; they have little or no training in security and, as a result, wouldn’t necessarily recognize a security threat.

      This is one reason Sjouwerman takes issue with statements, such as one by Denise Zheng, deputy director of the Center for Strategic and International Studies, who told CNN recently: “There is no patch for a stupid user.”

      The fact is, there is a patch for users who make errors in how they respond to cyber-threats. It’s called training, and it doesn’t need to be difficult or expensive. It just needs to be continuous.

      Sjouwerman’s advice is echoed by a number of security experts who point out that for any security plan to be effective, it has to involve the people who use the network. When I recently talked to Frank Abagnale about security exploits, he made the same point when he told me “someone in every breach did something they weren’t supposed to do.”

      How to Avoid the Fate of Sony, Target or Home Depot in 2015

      While it’s obvious that your company’s employees are a weak point for security, there are ways to reduce, if not eliminate, the problem, and that doesn’t mean firing all of your employees (despite the occasional temptation).

      What it does mean, as Sjouwerman explained, is some basic, one-on-one security training that actually shows everyone in the company what a security threat looks like. He said that what this doesn’t mean is the annual donuts-and-coffee, death-by-PowerPoint security lecture.

      Instead, it means that someone actually sits down with an IT representative where they get to see what actual phishing emails look like and where they learn that security threats could do things like draining their bank accounts. But it’s the hands-on experience that matters, he said. This one-on-one security training should also be performed for every new employee during the on-boarding process, Sjouwerman said.

      Sjouwerman explained: “You can at least step through security-awareness training during on-boarding, then do periodic simulated phishing attacks.” He said that such phishing simulations can use real phishing emails (of which there’s no shortage) with the original malicious links replaced with some that will alert IT when someone clicks on it. By doing this, employees become aware of what a phishing attack looks like, which then helps them learn to avoid them in the future.

      It’s also worth noting that there needs to be management buy-in. Even though effective security training doesn’t necessarily involve a lot of staff hours, it does involve some time and expense. “Boardrooms are going to have to realize that culture trumps compliance,” Sjouwerman said. “This requires a security initiative that makes it clear what they really have to start paying attention to.”

      While it’s critical that all employees get initial, and then repeated, security training, such an initiative needs to start at the top. Cyber-criminals often target senior executives because they have the best access to the data they most want to steal. Like other people in business, cyber-criminals want to expend their efforts where it’s most effective.

      “Cyber-crime has gone pro,” Sjouwerman said. “These guys are in it for the cash, and time is money,” he said. This means that they’ll go where the pickings are easiest and that may also mean that they’ll find some other company where the employees aren’t well-trained. Then it’ll be that company that’s the next one in the headlines with a breach.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×