
Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
How Can I Help My Users Spot Disinformation?How Can I Help My Users Spot Disinformation?
A combination of clever tools, good education, and better mindfulness might keep users from being manipulated.
April 20, 2020

Question: How can I help my users spot disinformation online?
Sam Small, CSO, ZeroFox: Education is the key to helping users effectively and consistently spot disinformation online. Include the topic in your security awareness and training curriculum. Explain its purpose and value, share and dissect the anatomy of its familiar forms and indicators, and discuss practical techniques your users can employ to validate or repudiate questionable information on their own. Then test your users' abilities to discern between authentic and fake content by presenting them with real examples of both (or alternatively, create your own).
Consider introducing your users to some of the many tools, apps, browser extensions, and community forums created to help people research and verify information online. Find an extensive list of tools that fight disinformation online, fact-checking tools, and resources curated by the RAND Corporation's Countering Truth Decay Initiative.
Want to go deeper? Encourage your users to practice a skill long celebrated by psychologists, Buddhists, and new-age yogis alike: mindfulness. Disinformation is designed to elicit a strong emotional response. The users most skilled in recognizing it are those with an acute awareness of their emotions and an ability to recognize attempts to manipulate them in real-time. Even so, separating fact from fiction is often difficult without additional context or information.
Related Content:
Check out this listing of free security products and services compiled for Dark Reading by Omdia analysts to help you meet the challenges of COVID-19.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023