Operations

11/29/2016
10:00 AM
Lysa Myers
Lysa Myers
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Cybersecurity User Training That Sticks: 3 Steps

People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.

Imagine yourself at a street corner with your preschool-aged child. Knowing that we all want our children to be able to cross the street on their own someday, what do you say to help educate and prepare them? We want to explain it thoroughly, so that they can move safely through the world, right?

How about: “Hey honey, do you see that car? It weighs approximately two tons, and is traveling at a speed of 36 miles per hour. Given that the average human walking speed is about 3 miles per hour, and the braking time for a car that size traveling that speed…”

Well, okay, maybe that’s a bit too much for a toddler. 

Or perhaps we should start with “Sweetheart, if you aren’t careful when you cross the street, you could be seriously injured or killed by cars. There were 347 pedestrians killed in traffic in California last year!”

While this is true, it’s liable to leave them feeling terrified, overwhelmed, and powerless.

There are ways to train -  even the most novice individuals - to pilot their way competently through a high-risk and complex scenario without overloading or traumatizing them. With simple instructions like “look both ways before crossing,” most of us manage to exit childhood with a solid understanding of how to safely navigate an intersection.

Why can’t we do the same thing for something as broad and technically challenging as computer security? The solution is to start simple, then break down the message into more complex instructions:

Start with aspirational advice
Stop, drop, and roll.” “Give a hoot – don’t pollute.” “Take a bite out of crime.” These slogans are intended to motivate people to change their behavior and to anchor actions to a simple, positive and memorable phrase. A group led by the National Cyber Security Alliance (NCSA) and the APWG has been creating a list of slogans intended to help people take control of their computer security, for instance: “Keep a clean machine,” “Share with care,” and “Lock down your login.”

Expand advice with tips
The crucial part of looking both ways before crossing is not so much the looking, but in pausing to observe hazards. So the next step in educating people is to give a little more information.

Tips should help clarify the slogans to explain succinctly what people should be doing to protect themselves. In the case of street crossing, this generally includes instructions about where it is safe to cross, looking and listening for hazards, and then finally crossing quickly and safely when the way is clear. In the case of computer safety advice, this should also include a list of actions they should take to identify and avoid hazards.

Using logins as an example, this should include tips for creating a strong password or passphrase, using unique passwords for each account, and enabling multi-factor authentication when possible. Here’s a list of resources for other online security topics.

Finally, specific technical steps
It’s natural that people will have questions about specific situations that you may want to answer proactively, or there may be certain caveats or nuances that need clarification. After introducing the advice and then clarifying it briefly, you can provide more detailed technical information for those who want or need it.

In the case of logins, for example, you might want to explain that there may be additional hazards like shoulder-surfing and phishing where you need to be more cautious about inputting your credentials. Or, you may want to give more clarification about how to enable multi-factor authentication, or what to expect when it’s in place. 

The world is not short of scary stories about the dangers lurking online, and this is leading people to feel like there is little they can do to mitigate risk. People are eager for common-sense cybersecurity advice that gives them control and helps keep them stay safer online. No one expects that we can completely eliminate accidents or online crime overnight, but we can all sleep a little easier if we know that we’re doing our best to observe and control our environment.

Related Content:

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12538
PUBLISHED: 2018-06-22
In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty provided FileSessionDataStore for persistent storage of HttpSession details, it is possible for a malicious user to access/hijack other HttpSessions and even delete unmatched HttpSessions present in the FileSystem's storage...
CVE-2018-12684
PUBLISHED: 2018-06-22
Out-of-bounds Read in the send_ssi_file function in civetweb.c in CivetWeb through 1.10 allows attackers to cause a Denial of Service or Information Disclosure via a crafted SSI file.
CVE-2018-12687
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has an assertion failure in DecodePixelData in tinyexr.h.
CVE-2018-12688
PUBLISHED: 2018-06-22
tinyexr 0.9.5 has a segmentation fault in the wav2Decode function.
CVE-2018-10002
PUBLISHED: 2018-06-22
ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Windows OS, when a Symbol is used as DLL name instead of a String This vulnerability appears to have been fixed in v1.9.24 and later.