Analytics
9/12/2012
03:27 PM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

End User Security Awareness Gap Remains Wide, Experts Say

Enterprise-driven security education programs continue to fall short of the mark

PHILADELPHIA, PENN. -- (ISC)2 World Congress 2012 and ASIS International 2012 -- End user awareness programs often fail to teach users much about security, and they frequently don't do much to improve enterprise security, experts said this week.

In a new survey on security training, Trustwave found that while 56 percent of security professionals claim they train new users during orientation, only 32 percent of employees say they have been educated on enterprise security.

This training gap has resulted in serious problems for some companies, according to the Trustwave study. Enterprises experience some 14.4 incidents of data loss per year due to employee negligence, and 15 percent of them have reported an insider breach executed with malicious intent.

Here at the annual meeting of (ISC)2, one of the world's largest associations of security professionals, members and other experts agreed that so-called "security awareness programs," while often required to meet human resources guidelines or compliance mandates, are often poorly conceived or poorly executed.

"One of the most frequent mistakes in putting together a program like this is to look at employees as one big clump of people, without differentiating between them," said (ISC)2 Foundation Director Julie Peeler, who led a panel on awareness program development at the conference.

"If your awareness program is going to work, you need to understand who you're educating," Peeler said. "Users have different skill levels, they are at different levels within the organization, and they have different time availability. Your program needs to take those differences into account."

Many users are still not aware of even the most basic security rules of thumb, according to Trustwave. In the study, respondents said 60 percent of users would plug in a USB stick found in a parking lot -- that number went up to 90 percent when the USB stick had their company logo on it.

One of the problems with user awareness programs is that they are geared toward giving users information, rather than changing their behavior, said Rohyt Belani, CEO of the security firm PhishMe, in a session here yesterday.

"Giving users information is not very useful if it doesn't cause them to behave in a more secure way," Belani said. "They need to see the potential impact of insecure behavior and change what they do."

Peeler agreed. "Sometimes awareness programs are developed by people who understand security, but don't know very much about learning theory," she said. "A lot of people don't learn very well with PowerPoint and an instructor. They might do better with a hands-on course, or more visual or auditory training. People learn in different ways."

Ideally, training programs should be developed by a security professional and training professional working together, rather than relying on one or the other, Peeler suggested. "You want somebody who knows security and what you're trying to teach, and you also want somebody who understands learning theory," she said.

The Trustwave study suggests that some organizations still don't have a policy in place to train users on. Some 87 percent of breached businesses did not have a security policy program that included user awareness when the breach took place, the study says.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
etyrrell021
50%
50%
etyrrell021,
User Rank: Apprentice
9/13/2012 | 7:24:28 PM
re: End User Security Awareness Gap Remains Wide, Experts Say
In my experience their is lack of interest from users - In their minds most feel they have better things to do. That is a big hurdle to the assimilation process. -áHave you ever seen the episode of the Office about Safety Training? It is hilarious and could easily be substituted for security awareness training.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1414
Published: 2015-02-27
Integer overflow in FreeBSD before 8.4 p24, 9.x before 9.3 p10. 10.0 before p18, and 10.1 before p6 allows remote attackers to cause a denial of service (crash) via a crafted IGMP packet, which triggers an incorrect size calculation and allocation of insufficient memory.

CVE-2015-2072
Published: 2015-02-27
Multiple cross-site scripting (XSS) vulnerabilities in SAP HANA 73 (1.00.73.00.389160) and HANA Developer Edition 80 (1.00.80.00.391861) allow remote attackers to inject arbitrary web script or HTML via unspecified vectors to (1) ide/core/plugins/editor/templates/trace/hanaTraceDetailService.xsjs or...

CVE-2015-2075
Published: 2015-02-27
SAP BussinessObjects Edge 4.0 allows remote attackers to delete audit events from the auditee queue via a clearData CORBA operation, aka SAP Note 2011396.

CVE-2015-2076
Published: 2015-02-27
The Auditing service in SAP BussinessObjects Edge 4.0 allows remote attackers to obtains sensitive information by reading an audit event, aka SAP Note 2011395.

CVE-2015-2101
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in the Navigate bar in the Navigate module before 6.x-1.1 and 7.x-1.x before 7.x-1.1 for Drupal allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.