Operations

11/29/2016
10:00 AM
Lysa Myers
Lysa Myers
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Cybersecurity User Training That Sticks: 3 Steps

People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.

Imagine yourself at a street corner with your preschool-aged child. Knowing that we all want our children to be able to cross the street on their own someday, what do you say to help educate and prepare them? We want to explain it thoroughly, so that they can move safely through the world, right?

How about: “Hey honey, do you see that car? It weighs approximately two tons, and is traveling at a speed of 36 miles per hour. Given that the average human walking speed is about 3 miles per hour, and the braking time for a car that size traveling that speed…”

Well, okay, maybe that’s a bit too much for a toddler. 

Or perhaps we should start with “Sweetheart, if you aren’t careful when you cross the street, you could be seriously injured or killed by cars. There were 347 pedestrians killed in traffic in California last year!”

While this is true, it’s liable to leave them feeling terrified, overwhelmed, and powerless.

There are ways to train -  even the most novice individuals - to pilot their way competently through a high-risk and complex scenario without overloading or traumatizing them. With simple instructions like “look both ways before crossing,” most of us manage to exit childhood with a solid understanding of how to safely navigate an intersection.

Why can’t we do the same thing for something as broad and technically challenging as computer security? The solution is to start simple, then break down the message into more complex instructions:

Start with aspirational advice
Stop, drop, and roll.” “Give a hoot – don’t pollute.” “Take a bite out of crime.” These slogans are intended to motivate people to change their behavior and to anchor actions to a simple, positive and memorable phrase. A group led by the National Cyber Security Alliance (NCSA) and the APWG has been creating a list of slogans intended to help people take control of their computer security, for instance: “Keep a clean machine,” “Share with care,” and “Lock down your login.”

Expand advice with tips
The crucial part of looking both ways before crossing is not so much the looking, but in pausing to observe hazards. So the next step in educating people is to give a little more information.

Tips should help clarify the slogans to explain succinctly what people should be doing to protect themselves. In the case of street crossing, this generally includes instructions about where it is safe to cross, looking and listening for hazards, and then finally crossing quickly and safely when the way is clear. In the case of computer safety advice, this should also include a list of actions they should take to identify and avoid hazards.

Using logins as an example, this should include tips for creating a strong password or passphrase, using unique passwords for each account, and enabling multi-factor authentication when possible. Here’s a list of resources for other online security topics.

Finally, specific technical steps
It’s natural that people will have questions about specific situations that you may want to answer proactively, or there may be certain caveats or nuances that need clarification. After introducing the advice and then clarifying it briefly, you can provide more detailed technical information for those who want or need it.

In the case of logins, for example, you might want to explain that there may be additional hazards like shoulder-surfing and phishing where you need to be more cautious about inputting your credentials. Or, you may want to give more clarification about how to enable multi-factor authentication, or what to expect when it’s in place. 

The world is not short of scary stories about the dangers lurking online, and this is leading people to feel like there is little they can do to mitigate risk. People are eager for common-sense cybersecurity advice that gives them control and helps keep them stay safer online. No one expects that we can completely eliminate accidents or online crime overnight, but we can all sleep a little easier if we know that we’re doing our best to observe and control our environment.

Related Content:

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18913
PUBLISHED: 2019-03-21
Opera before 57.0.3098.106 is vulnerable to a DLL Search Order hijacking attack where an attacker can send a ZIP archive composed of an HTML page along with a malicious DLL to the target. Once the document is opened, it may allow the attacker to take full control of the system from any location with...
CVE-2018-20031
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to preemptive item deletion in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2018-20032
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to message decoding in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor daemon t...
CVE-2018-20034
PUBLISHED: 2019-03-21
A Denial of Service vulnerability related to adding an item to a list in lmgrd and vendor daemon components of FlexNet Publisher version 11.16.1.0 and earlier allows a remote attacker to send a combination of messages to lmgrd or the vendor daemon, causing the heartbeat between lmgrd and the vendor ...
CVE-2019-3855
PUBLISHED: 2019-03-21
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server.