Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

End User Security Awareness Gap Remains Wide, Experts Say

Enterprise-driven security education programs continue to fall short of the mark

PHILADELPHIA, PENN. -- (ISC)2 World Congress 2012 and ASIS International 2012 -- End user awareness programs often fail to teach users much about security, and they frequently don't do much to improve enterprise security, experts said this week.

In a new survey on security training, Trustwave found that while 56 percent of security professionals claim they train new users during orientation, only 32 percent of employees say they have been educated on enterprise security.

This training gap has resulted in serious problems for some companies, according to the Trustwave study. Enterprises experience some 14.4 incidents of data loss per year due to employee negligence, and 15 percent of them have reported an insider breach executed with malicious intent.

Here at the annual meeting of (ISC)2, one of the world's largest associations of security professionals, members and other experts agreed that so-called "security awareness programs," while often required to meet human resources guidelines or compliance mandates, are often poorly conceived or poorly executed.

"One of the most frequent mistakes in putting together a program like this is to look at employees as one big clump of people, without differentiating between them," said (ISC)2 Foundation Director Julie Peeler, who led a panel on awareness program development at the conference.

"If your awareness program is going to work, you need to understand who you're educating," Peeler said. "Users have different skill levels, they are at different levels within the organization, and they have different time availability. Your program needs to take those differences into account."

Many users are still not aware of even the most basic security rules of thumb, according to Trustwave. In the study, respondents said 60 percent of users would plug in a USB stick found in a parking lot -- that number went up to 90 percent when the USB stick had their company logo on it.

One of the problems with user awareness programs is that they are geared toward giving users information, rather than changing their behavior, said Rohyt Belani, CEO of the security firm PhishMe, in a session here yesterday.

"Giving users information is not very useful if it doesn't cause them to behave in a more secure way," Belani said. "They need to see the potential impact of insecure behavior and change what they do."

Peeler agreed. "Sometimes awareness programs are developed by people who understand security, but don't know very much about learning theory," she said. "A lot of people don't learn very well with PowerPoint and an instructor. They might do better with a hands-on course, or more visual or auditory training. People learn in different ways."

Ideally, training programs should be developed by a security professional and training professional working together, rather than relying on one or the other, Peeler suggested. "You want somebody who knows security and what you're trying to teach, and you also want somebody who understands learning theory," she said.

The Trustwave study suggests that some organizations still don't have a policy in place to train users on. Some 87 percent of breached businesses did not have a security policy program that included user awareness when the breach took place, the study says.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
etyrrell021
50%
50%
etyrrell021,
User Rank: Apprentice
9/13/2012 | 7:24:28 PM
re: End User Security Awareness Gap Remains Wide, Experts Say
In my experience their is lack of interest from users - In their minds most feel they have better things to do. That is a big hurdle to the assimilation process. -Have you ever seen the episode of the Office about Safety Training? It is hilarious and could easily be substituted for security awareness training.
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...