SYS-CON MEDIA Authors: Liz McMillan, Carmen Gonzalez, Zakia Bouachraoui, Roger Strukhoff, David Linthicum

Related Topics: Cloud Security, Microservices Expo, Agile Computing, Apache

Cloud Security: Blog Post

Security Awareness Training: The Single Most Important Cost in IT Security

Targeted spearphishing is not going to go away, it will most likely increase as threat actors garner more success

Ok, ok, I know the title is a tad dramatic but hear me out on this one.

A well-known computer security professional and former NSA research scientist wrote an editorial back in July 2012 stating, "Money spent on security awareness training, is money wasted." Dave Aitel , a respected individual in the world of Computer Security and current CTO of Immunity, made this statement in light of the fact that several high profile intrusions had occurred at the hands of employees who were targeted in spearphishing attacks, some of which lacking in sophistication. I disagree with the above written statement by Mr. Aitel, I do however find the recommendations he has listed in his article to be spot on, and practical when incorporated with an educated user base.

But honestly, plunging your head into the sand does not make the problem go away. In fact, you are making a problem worse for those who pose the greatest risk to your network, your users. Targeted spearphishing is not going to go away, it will most likely increase as threat actors garner more success from these types of attacks. Technology alone cannot prevent or stop these types of intrusions; you must educate your users in a manner that highlights their importance and role on a company network. Every user poses a risk, every user is a potential victim, and every user should understand the gravity of their actions on a corporate network.

Here is another thought that had entered my mind, "How much does a security awareness program actually cost a company to implement, maintain and test?" Certainly not as much as the cost to clean up the damage from a large scale intrusion.  Oh, and add in the public's perception of your company losing PII, credit card data or even intellectual property, insurance, financial, and other consequences.  It seems like an increased investment in Security Awareness with an emphasis on actual user education would be money well spent.

I do not dispute the fact that security awareness training, as it is currently broadly implemented today, is not an effective defense against even simple spearphishing attacks targeting users. This does not mean that we simply scrap the idea of educating our users.  It means that we should improve the approach.  Attacks against users are not static, they are very dynamic, and our security awareness training should evolve as the threat changes. The user can be treated as a line of defense against spearphising attacks if they are properly armed with the information to potentially recognize an attack. Long ao when a castle was stormed by an enemy, every one was responsible for protecting the kingdom, not just the guards at the gates.

Here are some ideas to more effectively communicate and educate users within the context of security awareness:

  • Employ a dedicated Cyber Security professional to develop the security awareness training. Someone who not only understands the threats, but can interpret the real risks your company faces.
  • Create an environment for testing your employees that more accurately mimics what an outside threat would look like.
  • Perform monthly tests against your users with varying levels of sophistication.  Do not settle for a once a year mandated training that has not changed over the years.
  • Remove the standard testing style from your security awareness with questions and correct answers followed by a certificate of completion. This approach rarely works at educating your users. Instead utilize the results from your monthly tests to determine how well your employees understand the threat of attacks. Use this information to modify the approach.  Target real education.
  • Get feedback from your employees in the event that they were enticed to click on a link or open an attachment. Find out what elements of the spearphish caught them.
  • Consider providing your users with a simple way to communicate to your security team if they are suspicious of a particular email. An email address where your users can forward the potentially malicious or even suspicious email to that the security group monitors. Make sure all of your users are aware just how easy it is to report a suspect message and encourage them to report anything that they may question.
  • Finally, do not punish those users who were enticed to click on a link or download an attachment. Work closely with those who continuously fail your security awareness tests.

Helping your users to understand just how important they are to the security of your company could be the single most important step to better protecting your network.  The cost of education is likely the best money spent in effectively arming your users with the information they require to stop these types of attacks from succeeding.  Remember, it only takes one.

October is the Department of Homeland Security (DHS) National Cyber Security Awareness Month.  It is designed to engage and educate the public and private sectors through events and initiatives with the goal of raising awareness about cyber security.

For some excellent advice regarding other ways to better protect your network in the event of a successful host level intrusion, see page 2 of Mr. Aitels' article referenced above: here.

More Stories By Cory Marchand

Cory Marchand is a trusted subject matter expert on topics of Cyber Security Threats, Network and Host based Assessment and Computer Forensics. Mr. Marchand has supported several customers over his 10+ years within the field of Computer Security including State, Federal and Military Government as well as the Private sector. Mr. Marchand holds several industry related certificates including CISSP, EnCE, GSEC, GCIA, GCIH, GREM, GSNA and CEH.

Latest Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Platform9, the leader in SaaS-managed hybrid cloud, has announced it will present five sessions at four upcoming industry conferences in June: BCS in London, DevOpsCon in Berlin, HPE Discover and Cloud Computing Expo 2019.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
When you're operating multiple services in production, building out forensics tools such as monitoring and observability becomes essential. Unfortunately, it is a real challenge balancing priorities between building new features and tools to help pinpoint root causes. Linkerd provides many of the tools you need to tame the chaos of operating microservices in a cloud native world. Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. I...
In his general session at 21st Cloud Expo, Greg Dumas, Calligo’s Vice President and G.M. of US operations, discussed the new Global Data Protection Regulation and how Calligo can help business stay compliant in digitally globalized world. Greg Dumas is Calligo's Vice President and G.M. of US operations. Calligo is an established service provider that provides an innovative platform for trusted cloud solutions. Calligo’s customers are typically most concerned about GDPR compliance, application p...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.