Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Blog de Tenable

Suscribir

Cybersecurity Awareness: Six Tips to Help Your Employees Be Cybersmart

We believe it's time for a new approach to cyber awareness, one that borrows on the concept of the shared responsibility model common in cloud computing. Here's how we get there.

How much consideration does the average employee give to cybersecurity in your organization? If you're like most, you'll see human behavior running the gamut from the zealous guardian, who reports suspicious activity on a regular basis, to the security scofflaw, who does everything in their power to circumvent safeguards in the interest of "productivity." 

In the 18 years since the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) first launched Cybersecurity Awareness Month, much has changed about the way we all live and work. Even before the COVID-19 pandemic, organizations in all sectors were undergoing digital transformation and migrating infrastructure and service to the cloud. The widespread move to remote work in 2020 only served to accelerate the pace of change already well underway.

Yet, a new global study commissioned by Tenable and conducted by Forrester Consulting reveals that many employees continue to view cybersecurity as a hindrance rather than a benefit. El estudio, Más allá de los límites: The Future of Cybersecurity in the New World of Work, surveyed 479 full-time employees working from home three or more days a week. While the vast majority (81%) consider protecting customer data to be somewhat or very important, more than half admit to using a personal device to access it. Equally concerning, the study reveals that:

  • More than four in 10 remote workers (44%) feel cybersecurity restrictions and policies make them less productive;
  • A third (36%) delay applying updates to their devices; and
  • Over a quarter (27%) admit to sometimes ignoring or going around cybersecurity policies. 

What do these findings mean for security leaders? It's safe to assume that, on any given day, a significant number of workers are avoiding basic cyber hygiene best practices, such as using only company-provided devices to access sensitive data, only accessing company systems and data via Virtual Private Network (VPN) and not connecting via public Wi-Fi.

So, what can be done about it? We believe it's time for a new approach, one that borrows on the concept of the shared responsibility model common in cloud computing. In this model, cybersecurity would be considered a corporate strategic objective from the top down. Every employee, regardless of position or rank, would have a "security scorecard" baked into their annual performance review metrics, given as much weight as the other measures of their success. Security leaders, in return, would commit to making it as easy as possible for employees to practice sound cybersecurity throughout their workday. 

6 tips for teaching employees how to be cybersmart

Moving to such a shared responsibility model is far more complex than it sounds. Creating a security scorecard for each employee would require robust asset management across business units so security leaders could have visibility into who owns each device or application and who they report to, and a centralized dashboard into which the findings could be continuously tracked. It would require careful attention to legal and regulatory concerns to ensure any measures put in place would respect the privacy of employees. And it would require significant resources to manage.

Yet, organizations can begin laying the foundations for such a model today. The following six tips offer ideas for how cybersecurity leaders can teach employees to be cybersmart:

  1. Start small. Identify one department or team within your organization and spend time with them. Learn how they work and ask them to identify any security practices and policies they feel are working well and provide honest feedback about the ones they feel are holding them back. 
  2. Make it seamless. Look for processes and solutions that reduce friction in the employee's workflow. Remember, the builders of consumer apps and devices prioritize engagement and ease of use; security tools and processes need to be engaging and easy to use, too, otherwise employees will avoid them.
  3. Ask for help. Consider working with your organization's human resources, internal communications or marketing team to find new ways to engage employees. You're the security experts, they're the communications experts. Joining forces could lead to fresh ideas on how to educate employees and implement a cybersmart culture.
  4. Explain the "why" behind your measures. Don't just tell employees what they need to do; help them understand why it matters to them. Show them how they can be part of the solution, not part of the problem. 
  5. Be available. Push your executives to include time for cybersecurity discussions during every companywide meeting so you can constantly reinforce the messaging and keep people up to date on new efforts. Schedule regular "ask me anything" sessions with employees so you can address any misinformation and encourage continuous learning.
  6. Make it worth their while. Understand what motivates employees and then build your program around that. For example, do employees at your organization respond primarily to financial incentives? Or do they prefer public recognition for their efforts? Does motivation vary by team or department? Take the time to learn what matters to everyone — ask what motivates the most zealous guardians and why the security scofflaws are avoiding your policies. 

While security leaders bear the greatest responsibility for keeping the organization safe, it's not something they can do in a vacuum. Building a cybersmart culture requires everyone in the organization, from the top down, to understand their roles and responsibilities. Finding the right mix of technologies, people and processes will help you increase the number of zealous guardians and reduce the number of security scofflaws in your organization. 

Para obtener más información

Artículos relacionados

Noticias de ciberseguridad que le son útiles

Ingrese su correo electrónico y nunca se pierda alertas oportunas y orientación en seguridad de los expertos de Tenable.

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable.

Su prueba de Tenable Vulnerability Management también incluye Tenable Lumin y Tenable Web App Scanning.

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable. Compre una suscripción anual hoy mismo.

100 activos

Seleccione su tipo de suscripción:

Comprar ahora

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable.

Su prueba de Tenable Vulnerability Management también incluye Tenable Lumin y Tenable Web App Scanning.

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable. Compre una suscripción anual hoy mismo.

100 activos

Seleccione su tipo de suscripción:

Comprar ahora

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable.

Su prueba de Tenable Vulnerability Management también incluye Tenable Lumin y Tenable Web App Scanning.

Tenable Vulnerability Management

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable. Compre una suscripción anual hoy mismo.

100 activos

Seleccione su tipo de suscripción:

Comprar ahora

Probar Tenable Web App Scanning

Disfrute de acceso completo a nuestra última oferta de escaneo de aplicaciones web diseñada para aplicaciones modernas como parte de la plataforma Tenable One Exposure Management. Escanee de manera segura todo su portafolio en línea para detectar vulnerabilidades con alto grado de exactitud sin el esfuerzo manual intensivo ni la interrupción de aplicaciones web críticas. Registrarse ahora.

Su prueba de Tenable Web App Scanning también incluye Tenable Vulnerability Management y Tenable Lumin.

Comprar Tenable Web App Scanning

Disfrute el acceso completo a una plataforma moderna para la gestión de vulnerabilidades en la nube, que le permite ver y rastrear todos sus activos con una precisión inigualable. Compre una suscripción anual hoy mismo.

5 FQDN

USD 3578

Comprar ahora

Probar Tenable Lumin

Visualice y explore su gestión de exposición, realice un seguimiento de la reducción de riesgos a lo largo del tiempo y compárese con sus competidores con Tenable Lumin.

Su prueba de Tenable Lumin también incluye Tenable Vulnerability Management y Tenable Web App Scanning.

Comprar ahora Tenable Lumin

Póngase en contacto con un representante de ventas para saber cómo puede ayudarle Tenable Lumin a obtener información de toda su organización y gestionar el riesgo cibernético.

Probar Tenable Nessus Professional gratuitamente

GRATIS POR 7 DÍAS

Tenable Nessus es el escáner de vulnerabilidades más completo en el mercado hoy en día.

NUEVO - Tenable Nessus Expert
Ahora disponible

Nessus Expert viene con aún más funcionalidades, incluyendo escaneo de superficie de ataque externa y la capacidad de agregar dominios y escanear infraestructura en la nube. Haga clic aquí para probar Nessus Expert.

Rellene el formulario a continuación para continuar con la prueba de Nessus Pro.

Comprar Tenable Nessus Professional

Tenable Nessus es el escáner de vulnerabilidades más completo en el mercado hoy en día. Tenable Nessus Professional ayudará a automatizar el proceso de escaneo de vulnerabilidades, ahorrará tiempo en sus ciclos de cumplimiento y le permitirá involucrar a su equipo de TI.

Compre una licencia multi anual y ahorre. Agregue Soporte Avanzado para acceder a soporte por teléfono, chat y a través de la Comunidad las 24 horas del día, los 365 días del año.

Seleccione su licencia

Compre una licencia multi anual y ahorre.

Añada soporte y capacitación

Probar Tenable Nessus Expert gratuitamente

GRATIS POR 7 DÍAS

Diseñado para la superficie de ataque moderna, Nessus Expert le permite ver más y proteger a su organización contra las vulnerabilidades, desde TI hasta la nube.

¿Ya tiene Tenable Nessus Professional?
Actualice a Nessus Expert gratuitamente por 7 días.

Comprar Tenable Nessus Expert

Diseñado para la superficie de ataque moderna, Nessus Expert le permite ver más y proteger a su organización contra las vulnerabilidades, desde TI hasta la nube.

Seleccione su licencia

Compre una licencia plurianual y ahorre más.

Añada soporte y capacitación