Don’t let all
your hard work go to waste. The worst thing to do after investing time and
resources into your information security program is to allow it to sit on the
shelf and become obsolete. Threats and risks are changing daily and it is
imperative that your policies stay up to date. Requiring an annual review, with
results are reported to the Board of Directors and senior management, will help
to ensure that your program remains current and can handle any future
incidents.
Monday, December 17, 2012
Monday, December 10, 2012
Information Security Best Practices: Incident Response
Hands down,
the worst time to create an incident response program is when you are actually
having an incident. You can’t undo what has happened and you’re in crisis mode
dealing with the after effects of the breach.
Not the time
to be putting policy to paper.
Your
reputation is severely at risk, and if you respond inadequately you risk making
it worse with law enforcement as well as your customers. Act as if a breach is
inevitable and take the time to develop the language and procedures you will
use in the event of an incident to ensure you’re prepared when the time comes.
Monday, December 3, 2012
Information Security Best Practices: Employee Awareness Training
How well
informed are your employees to identify or prevent a security incident? Each
and every one of your employees can act as a member of your own security army
with some simple training. The first step in recruiting them for the cause is
to set the expectations appropriately and communicate those expectations in
your policy.
Wednesday, November 21, 2012
Information Security Best Practices: Wireless Networking
There is no
doubt that the implementation of wireless networks has saved many organizations
both time and money in comparison with traditional cabling. As you decide what
type of network connectivity to adopt, understand that with increased
flexibility allowed by wireless, a stronger encryption standard is required to
ensure there is no abuse.
Friday, November 9, 2012
Information Security Best Practices: Password Requirements and Guidelines
Your
employees dread having another password to remember. The more complicated the
requirements you make to ensure security, the more they decide to write them
down and expose them to others. Establish a strong password policy but stay
within reason for your employees. Sometimes, a little additional training as to
why the policy is the way it is can be all you need to gain acceptance.
Monday, October 15, 2012
Information Security Best Practices: Data Classification and Retention
Lessen your
liability by classifying exactly what type of data you need and how long you
need it. A breach is bad enough, what’s worse is if data is stolen that you
didn’t need to keep or shouldn’t have had to begin with. In the case of
TJX (“PCI DSS
auditors see lessons in TJX data breach” TechTarget), many of the
credit card numbers affected had no business purpose in being kept.
Tuesday, October 2, 2012
Information Security Best Practices: Data Classification and Retention
Lessen your liability by classifying exactly what type of data you need and how long you need it. A breach is bad enough, what’s worse is if data is stolen that you didn’t need to keep or shouldn’t have had to begin with. In the case of TJX many of the credit card numbers affected had no business purpose in being kept.
Wednesday, August 29, 2012
Information Security Best Practices: Physical Security
Documents
don’t walk out of the office on their own. Having strict rules about who can
physically access your offices and how they gain entry can decrease the
likelihood that an unauthorized individual is present to steal information. The
next step is to ensure that your policy documents how physical information is
stored and destroyed.
Monday, August 20, 2012
Information Security Best Practices: Vendor Management
You’re only
as strong as your weakest link, and when you work with third-party providers
their information security downfall can become your issue. Make sure you
document which vendors receive confidential information and how this
information is treated when in the custody of the vendor. The lack of strict
vendor guidelines could increase the risk of releasing your customers’ private
information.
Tuesday, July 31, 2012
Information Security Best Practices: Software Updates and Patches
What’s your
stance when it comes to patch management? Do you require patches and upgrades
to be implemented immediately? Are you sure you’re actually doing what your
policy says?
Random checks
to confirm you are following your own rules is the best way to monitor the
activity.
If you’re
scratching your head at my use of the phrase “patch management”, understand
that if you don’t keep up to date on your system patches and upgrades, you
leave yourself wide open for the most basic of hacks. If you never update, your
vulnerabilities are exponentially increased. Your best practices Information
Security Program should clearly document your patch management procedures and
frequency of the updates.
Thursday, July 19, 2012
Information Security Best Practices: End User Acceptable Use Guidelines
Your
policy should contain specific language detailing what employees can do with
“your” workstations. While we hope that all company property is used for
company purposes, this just isn’t the case in real life. Instruct employees as
to what is considered business use and explain the risks of downloading games
or using tools like instant messaging.
Thursday, June 28, 2012
Information Security Best Practices: The Information Security Officer
The first
thing that any security program must do is establish the presence of the
Information Security Officer. Depending on the size of your security
environment, this could be a full-time position or a current employee who has
the availability to take on further duties.
Besides the
time element, the organization must clearly define the expectations of the
Information Security Officer and determine if an individual is capable to fill
the role. During a later post I will describe the attributes that ascertain
“capability”, but the complete lack of someone in this role means that
information security is not a priority in your organization.
Thursday, May 10, 2012
The final word
Jumping directly to often mind-numbing, glassy-eye-causing, security
training is not usually the best approach to changing employee behavior.
Employees have to understand why protection of information assets is important,
and why they should care. Awareness efforts, beginning with the first day
of employment, and regularly reinforced, are the best way to get them
interested in taking the next step.
Using post-presentation employee input, and actually using it to tailor
the message to better fit the audience, is another great way to keep employees
involved.
Friday, April 27, 2012
Evaluation
All efforts to enlighten employees must be evaluated. Here we’ll look at participant evaluation forms.
Identifying the right content for awareness presentations, for
preparing users for more focused training, is not easy. The initial
process for deciding what to include, and who should assist in the decision
making, is covered in our previous planning discussion. But we don’t
always get it right the first time. In addition, our audience might see
benefit in adding, subtracting, or expanding content. The delivery method
might also need work.
Use of evaluation forms is an excellent way to get participant
feedback, of alerting us to ways to more effectively reach our awareness
objectives. The National Institute of Standards and Technology (NIST) Special
Publication 800-16, Information Technology Training Requirements: A Role- and
Performance-based Model, contains a great sample student questionnaire (Exhibit
5-2, p. 165).
Friday, March 30, 2012
Delivery method
There are three principle methods of delivery for the security awareness message: Web-based, offline, and instructor led. Web-based delivery is the best way for most distributed organizations to reach all employees. Multi-purpose authoring tools enable customized messages, delivered by PowerPoint and enhanced with audio. They also allow integration of quizzes and tracking of participation. Placing an awareness presentation on the company Intranet, with participation tracking enabled, is a good way to reach everyone. It’s also a good way of demonstrating awareness efforts to auditors.
Offline awareness presentations are provided for those employees without high speed access to the Intranet. However, special delivery packages are not usually needed if multi-purpose tools are used. For example, the training modules on my site are available for either online viewing or for download. I could also choose to distribute them via CD-ROM.
Instructor led training is typically not necessary for initial awareness delivery. The content should be high-level, easy to understand, and applicable to every participant. It’s usually appropriate to reserve classroom training for in-depth training of targeted audiences.
Regardless of the delivery method, it’s important to validate everyone participates. Leaving pockets of employees unaware of the importance of security and how their actions affect system assurance is like leaving one or more windows open on a locked house.
Wednesday, March 14, 2012
Raising Employee Awareness
Building employee awareness begins with the new hire orientation process. Make sure this is included in your ISATP. On their first day, employees should understand what is and is not considered safe behavior. This initial exposure to company expectations might consist of requiring each person to sit through a short awareness presentation, followed by their reading and signing the acceptable use and password management policies.
Break training into three different content groups, based on whether the target audience was management, IT staff, or business users. This is fine for training, but the awareness message is the same for all employees, regardless of role. Organizations which are just now implementing an ISATP should follow-up with existing employees to ensure the awareness message is consistently distributed throughout the entire workforce.
Break training into three different content groups, based on whether the target audience was management, IT staff, or business users. This is fine for training, but the awareness message is the same for all employees, regardless of role. Organizations which are just now implementing an ISATP should follow-up with existing employees to ensure the awareness message is consistently distributed throughout the entire workforce.
Wednesday, February 29, 2012
Awareness vs. Training
It’s a big temptation to jump right to how-to and policy training when implementing an Information Security Awareness Training Program (ISATP). However, you need to prepare your target audience first. Each person in your organization must understand why security is important. They must also realize management commitment to information asset assurance. Finally, each employee should understand the impact—both personal and organizational—if security best practices (as defined in policies, standards and guidelines) are not followed.
Once you have their attention, you can ask them to accept requests to sit through security training sessions, sessions that drag them away from their normal job of actually running or supporting business operations. A more important effect of awareness might be employee willingness to listen and learn.
Once you have their attention, you can ask them to accept requests to sit through security training sessions, sessions that drag them away from their normal job of actually running or supporting business operations. A more important effect of awareness might be employee willingness to listen and learn.
Thursday, February 23, 2012
Security begins with employee understanding and acceptance
Security awareness and training are typically covered under the single heading of Information Security Awareness Training. In fact, that’s the approach I took in the previous two posts on this topic, covering how to change employee behavior at a high level. This high-level approach is appropriate for many organizations, especially those with tenuous management commitment and a meager budget. However, awareness and training, when part of a formal methodology for employee behavior modification, are actually two different activities.
In future posts I will look at creating secure behavior in our organizations with a process for preparing users for more focused training.
In future posts I will look at creating secure behavior in our organizations with a process for preparing users for more focused training.
Tuesday, January 10, 2012
Information Security Awareness – Educate, Inform, Secure
Educate your employees about information security or all the security tokens in the world won’t save you.
A company may have a decent size security budget and spend it effectively on firewalls and other protection devices but if you fail to educate your end-users all that investment can be for nothing. Hackers, spammers and other evil doers regularly target end-users because it is often the easiest method of attack and is extremely effective. Targeted spam emails and malicious web sites are two of the most common threats but it is important to implement a general awareness campaign that covers a wide range of information security issues from what makes a good password to the importance of physical security. Here are some of the important factors to consider when implementing an information security awareness program.
Be Consistent – Develop a weekly or monthly routine and stick to it. Send out the email on a consistent day so the user will come to expect it and perhaps even look forward to it if you follow the other recommended steps below. Always send it from the same account to minimize the likelihood for confusion which could assist targeted spam attempts.
Keep It Simple – Do not use overly technical language that will confuse or turn off users. Speak in the communications like you would talk in a conversation and
Do I not entertain you? – Try to write in an interesting style and even use humor to keep your users entertained. Entertaining material is more likely to be read and absorbed then stuff that would put an insomniac to sleep.
Provide Examples – Many people learn best from examples and there are plenty of those readily available. Find a recent incident that demonstrates the point you are trying to make and it will make it more real and less theoretical. People listen more when they no others have fallen for a trick and are more likely to absorb the information.
Be relevant – Providing examples that they can use at both work and home is a great way to keep people interested. Examples include safe internet surfing, avoiding spam emails, and the importance of having up to date anti-virus signature files.
Consider Posters – Emails are great but they are often times easily ignored. Utilizing posters in high traffic areas in addition to email is a great way to mix it up and capture the attention of people who otherwise might not care.
Make it a job requirement – Security is only as strong as the weakest link. It is everyone’s responsibility to follow good information security practices and keep the company secure.
A company may have a decent size security budget and spend it effectively on firewalls and other protection devices but if you fail to educate your end-users all that investment can be for nothing. Hackers, spammers and other evil doers regularly target end-users because it is often the easiest method of attack and is extremely effective. Targeted spam emails and malicious web sites are two of the most common threats but it is important to implement a general awareness campaign that covers a wide range of information security issues from what makes a good password to the importance of physical security. Here are some of the important factors to consider when implementing an information security awareness program.
Be Consistent – Develop a weekly or monthly routine and stick to it. Send out the email on a consistent day so the user will come to expect it and perhaps even look forward to it if you follow the other recommended steps below. Always send it from the same account to minimize the likelihood for confusion which could assist targeted spam attempts.
Keep It Simple – Do not use overly technical language that will confuse or turn off users. Speak in the communications like you would talk in a conversation and
Do I not entertain you? – Try to write in an interesting style and even use humor to keep your users entertained. Entertaining material is more likely to be read and absorbed then stuff that would put an insomniac to sleep.
Provide Examples – Many people learn best from examples and there are plenty of those readily available. Find a recent incident that demonstrates the point you are trying to make and it will make it more real and less theoretical. People listen more when they no others have fallen for a trick and are more likely to absorb the information.
Be relevant – Providing examples that they can use at both work and home is a great way to keep people interested. Examples include safe internet surfing, avoiding spam emails, and the importance of having up to date anti-virus signature files.
Consider Posters – Emails are great but they are often times easily ignored. Utilizing posters in high traffic areas in addition to email is a great way to mix it up and capture the attention of people who otherwise might not care.
Make it a job requirement – Security is only as strong as the weakest link. It is everyone’s responsibility to follow good information security practices and keep the company secure.
Subscribe to:
Comments (Atom)