Leadership, Training, Security Staff Acquisition & Development
Cybersecurity Awareness Month 2023: Employees and their devices are still at the center of a security strategy

Today’s columnist, Max Shier of Optiv, says companies should make awareness training the center of their secure device strategy. (Stock Photo, Getty Images)
On the 20th anniversary of Cybersecurity Awareness Month (CSAM), the best way to defend against cyberattacks two decades later still remains employee awareness and training. In fact, the Cybersecurity & Infrastructure Security Agency (CISA) found that 90% of all cyberattacks begin with phishing. Even employees with the best of intentions can inadvertently fall for phishing and social engineering attacks, giving cybercriminals a gateway into corporate networks where they can then execute more advanced attacks, such as ransomware, or move laterally to steal information or inflict widescale damage. If phishing success rates weren’t already bad enough, today, innovative technologies, such as generative AI, are making it nearly impossible to distinguish between a legitimate and a fraudulent email — or video, voicemail or text message, for that matter. Cybercriminals are upping their game with sophisticated tactics, and this means organizations need to double down on awareness and training initiatives that keep employees and their business safe. Vigilance: Even though AI makes phishing emails harder to detect, employees still should know the traditional tell-tale signs that indicate an email may be fake, including spelling errors, suspicious attachments or links and tones of misplaced urgency. Additionally, encourage them to slow down when reading emails to make sure they can spot these red flags. Password hygiene: Make passwords long and complex, with a minimum of 12 characters that include lowercase and uppercase letters, numbers and special symbols. Employees should update them regularly and avoid reusing passwords across accounts. Multi-factor authentication (MFA): Build on strong passwords with MFA, which requires users to present at least two pieces of evidence to prove their identity. This makes it much harder for cybercriminals to gain unauthorized access to accounts even if they do compromise a password. Social media savvy: Cybercriminals use publicly available information in phishing and other social engineering schemes. Employees that limit their digital footprint will avoid being an easy target. For example, avoiding “checking into” locations and tagging or sharing photos, keeping profile information to a minimum, and, when traveling for work or working remotely in a public setting, using an enterprise virtual private network (VPN) solution and browsing in incognito mode. Additionally, with cybercriminals increasingly exploiting vulnerabilities, security teams also should make device safety a big component of awareness and training programs. In this regard, ensure employees perform software and firmware updates immediately. Updates not only enhance features, but they also deliver security patches to address known vulnerabilities. While it’s very tempting to push them off, especially when in the middle of a work assignment, every second a vulnerability does not get patched is another second that gives cybercriminals an open door into a device and the corporate network. Other device safety best practices to share with employees include turning off auto-connect for Wi-Fi and Bluetooth to avoid accidentally connecting to a threat actor’s network and always verifying sources before downloading software or applications. Finally, make sure employees don’t forget about the security of their home network and router. With home networks now doubling as work networks for many, employees need to bring organizational security best practices to their home. For example, encourage them to change the default password on their router, set up a guest network for visitors and only use WPA2 or the newer WPA3 protocols. Also remind employees to think about those Internet of Forgotten Things (IoFT) devices — the ones we often forget about, but remain connected in the background, allowing an easy access point for threat actors.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds