SlideShare ist ein Scribd-Unternehmen logo
1 von 12
fecinc.com
Cybersecurity: Are Your
Employees the Weakest Link?
fecinc.com
 External attacks
 Viruses and worms
 Phishing and Pretexting
 Data Leakage
Understanding the Risk Landscape
fecinc.com
A shift in thinking
External threats are most
familiar
Inside threats getting more
attention
fecinc.com
 Internal risk events
– Weak credentials
– Credential sharing
– Unauthorized application use
– Device loss/theft
– Disgruntled workers on social
media
 Targeted information
– Private customer data
– Financials
– Intellectual Property
 Consequences
– Legal liability
– Stock manipulation
– Lost revenue
Looking Inside for Risks
fecinc.com
• Publish and educate
• Require Strong
Passwords
• Complex and strong are
different
– Longer is better than
random complexity
– Easy to remember is
better
• Cycle Passwords
A Working Password Policy
fecinc.com
• Commonly a focus
• Hobbles usability
• Users circumvent
• Focus on strength
instead.
– Long
– Memorable
The Complexity Problem
fecinc.com
 Policies, Inventories,
Logs and Reports
– Documentation is key
– Tracking and Reporting
 Software-based
enforcement
 Internal Audits
– Systemic
– Manual
 External Audits
– Consultants
– Certifications
Measuring Effectiveness
fecinc.com
• Have one
• Keep it current
• Consider usability
• Educate
– Frame the Discussion
– Set an expectation
Effective Security Policies
fecinc.com
Bank Tellers and Retail Cashiers
fecinc.com
Preventing Data Leakage:
Keeping the Good “In”
 Methods of Data Leakage
– Lost Equipment
– Stolen Equipment
– Equipment gifted or sold to former
employees
– USB drives
– Unauthorized software access via stolen
or shared credentials
– Social Media Posts
– Unauthorized Cloud sharing
 Stopping Leaks
– Firewall Rules
– Data encryption and MDM
– Equipment release process
– Have a USB drive policy or
– Lock USB ports out
– Pay attention to good work process
– Social Media Use Policy or
– Block social media posting
fecinc.com
 Overall security
– https://www.sans.org/critical-security-controls/control/14
 Data Leakage Prevention Papers
– http://www.cisco.com/c/en/us/solutions/collateral/enterprise-
networks/data-loss-prevention/white_paper_c11-503131.html
– http://resources.infosecinstitute.com/data-loss-prevention-dlp-
strategy-guide/
 Password Strength Article
– http://www.infoworld.com/article/2616157/security/creating-strong-
passwords-is-easier-than-you-think.html?page=2
Additional Information
fecinc.com
Mike Ockenga
Manager IP Services
Finley Engineering Company
m.Ockenga@fecinc.com
952-582-2912
Discussion

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 

Kürzlich hochgeladen (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 

Empfohlen

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Cybersecurity: Are Your Employees Your Weakest Link?

  • 2. fecinc.com  External attacks  Viruses and worms  Phishing and Pretexting  Data Leakage Understanding the Risk Landscape
  • 3. fecinc.com A shift in thinking External threats are most familiar Inside threats getting more attention
  • 4. fecinc.com  Internal risk events – Weak credentials – Credential sharing – Unauthorized application use – Device loss/theft – Disgruntled workers on social media  Targeted information – Private customer data – Financials – Intellectual Property  Consequences – Legal liability – Stock manipulation – Lost revenue Looking Inside for Risks
  • 5. fecinc.com • Publish and educate • Require Strong Passwords • Complex and strong are different – Longer is better than random complexity – Easy to remember is better • Cycle Passwords A Working Password Policy
  • 6. fecinc.com • Commonly a focus • Hobbles usability • Users circumvent • Focus on strength instead. – Long – Memorable The Complexity Problem
  • 7. fecinc.com  Policies, Inventories, Logs and Reports – Documentation is key – Tracking and Reporting  Software-based enforcement  Internal Audits – Systemic – Manual  External Audits – Consultants – Certifications Measuring Effectiveness
  • 8. fecinc.com • Have one • Keep it current • Consider usability • Educate – Frame the Discussion – Set an expectation Effective Security Policies
  • 9. fecinc.com Bank Tellers and Retail Cashiers
  • 10. fecinc.com Preventing Data Leakage: Keeping the Good “In”  Methods of Data Leakage – Lost Equipment – Stolen Equipment – Equipment gifted or sold to former employees – USB drives – Unauthorized software access via stolen or shared credentials – Social Media Posts – Unauthorized Cloud sharing  Stopping Leaks – Firewall Rules – Data encryption and MDM – Equipment release process – Have a USB drive policy or – Lock USB ports out – Pay attention to good work process – Social Media Use Policy or – Block social media posting
  • 11. fecinc.com  Overall security – https://www.sans.org/critical-security-controls/control/14  Data Leakage Prevention Papers – http://www.cisco.com/c/en/us/solutions/collateral/enterprise- networks/data-loss-prevention/white_paper_c11-503131.html – http://resources.infosecinstitute.com/data-loss-prevention-dlp- strategy-guide/  Password Strength Article – http://www.infoworld.com/article/2616157/security/creating-strong- passwords-is-easier-than-you-think.html?page=2 Additional Information
  • 12. fecinc.com Mike Ockenga Manager IP Services Finley Engineering Company m.Ockenga@fecinc.com 952-582-2912 Discussion

Hinweis der Redaktion

  1. Weak and shared passwords are the first flaw in internal security. A USB stick with intellectual property, customer or business account information, or any other critical data, leaving in someone’s pocket, can destroy a business. A lost or stolen laptop or mobile with private data on it can put a company at huge risk of liability. Social engineering, with phishing or pretexting to get access to secure information through an employee can too. While you’re looking at intrusion detection and prevention, or virus and Trojan prevention, your cyber security risk from inside could be sneaking out in employee Facebook posts.
  2. <Intro Question #1> The policy must be easy to find, easy to understand, and easy to follow. The resulting passwords must be strong while still easy to remember and use. Anecdote: Acquaintance stores credentials for all work systems in an outlook contact. Time is a critical element to cracking passwords. Set a cycle that works for your business. Most recommend 30-90 days.
  3. Say you’re the person entering the maze, and you do so every day. Wouldn’t you keep a map to reference? That map is an insecure record of your password. Anecdote: Acquaintance stores credentials for all work systems in an outlook contact. Long easy to remember passwords are far better. At least 12 characters for users, 15 for Admins. One recommendation is to use a long memorable phrase in all passwords, shifting its location and varying surrounding characters in ways that make sense to the user. “A password of sufficient length can defeat a password guesser or cracker, whereas complexity adds significant value only when the complexity is random or near-random.” http://www.infoworld.com/article/2616157/security/creating-strong-passwords-is-easier-than-you-think.html
  4. <Intro Question #2> Not ironically, information is key to information security. Documented policies, hardware and software inventories, access and transaction logs, configuration and change management processes all take time, but are critical foundations to security. User management structures such as software-enforced password reset can ensure compliance with password time cycles. Regular reporting and internal audits are also the best ways to measure success against your own policies. Often these can be done systemically, but sometimes manual measurement is required. Independent external consultants can be effective in identifying gaps in your cybersecurity structure. Additionally, certifying compliance with industry standards such as PCI and NERC CIP requires external auditors.
  5. <Intro Question #3> • 23 percent of IT professionals work for a company that does not have security policies. • 47 percent of employees and 77 percent of IT professionals worldwide believe that their companies' security policies need improvement and updating. • A 20 to 30 percent difference between the number of IT professionals and the number of employees who know that a security policy exists indicates that IT is not sufficiently educating and communicating security policies to employees, and that employees may not be paying attention. • The majority of IT professionals believe that employees don't always adhere to policies because they don't understand the risks involved with their behavior, because security isn't a top-of-mind priority or issue, or because the employees just don't care. http://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/data-loss-prevention/white_paper_c11-503131.html Having a policy is the first step towards implementation and effectiveness measurement. Communicating relevant policy sections to various employees is critical to a working policy. To work, a policy must be about good work processes, and not cumbersome impediments to daily work.
  6. Creating the security culture. A major problem with cyber security education and implementation is that users may not understand their roles in context, and can get overwhelmed. To increase your staff’s comfort and understanding of their role in cyber security, it may help to use the analogy of a bank teller or retail cashier. These jobs play a critical role in the security of their businesses. Bank tellers are trained as a matter of course to complete transactions as securely as they can. Retail cashiers are trained in the same way to handle money as securely as they can while at the register. Neither one is expected to police the establishment, or stop a crime singlehandedly. For most companies, information can be as valuable to their business as daily transactions are to banks or retailers. But staff in those companies are no more specialized in information security than a teller or cashier are in preventing robbery. They just need training to do their daily work securely. If they work with a customer database, or payment card data, they need simple training, in context, to use that information in the least risky way. They probably do NOT need training in an end-to-end cybersecurity plan and policy. Simple, tailored training about how to do daily work the secure way is a whole different discussion than yet another fire and brimstone lecture about what can happen if they give their password to a colleague. Make security about good work processes, not about abstract risks in bad processes.
  7. <Intro Question #4> Draw bridges work two ways. They keep the bad stuff out, but they also help keep good things in. You need to look at security in both directions too. Listed here are some of the most common methods data can leak from your business, and the best methods for prevention.