Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Fundamental Flaw in Security Awareness Programs
Newest First  |  Oldest First  |  Threaded View
cbear42
50%
50%
cbear42,
User Rank: Strategist
8/14/2018 | 8:49:21 AM
Complete Agreement on this one. . .
My concern is that there seems to be a "throw their hands in the air" approach from most development teams and in the industry when it comes to trying to ensure that employees don't make a bad security choice. They have heard the mantra that "users are the weakest link" so often and for so long that they believe there is simply nothing that THEY can do to keep users from making a bad decision.

I am currently working on a doctorate in computer science in the area of usable security. And, there ARE things that can be explored to keep users safer.

1. We can alter the visual format of security messages from one instance to the next. Security messages that morph (changing shape, color, wording) - get a user's attention. Messages that look the same and read the same put users into "autopilot". Something "different" causes them to stop and pay attention - even if only briefly. But, in that brief moment - getting their attention is critical to stopping them from making a careless mistake.

2. Security messages that make no sense to the typical end-user who is NOT a security freak or techie. 

3. We rail about insecure passwords - so why aren't password managers part of every corporate security stack? Users would need minimal training and it would go far to stop the "Post-it note"- syndrome. People select the same password over and over because they can remember it. A password manager can generate a new and complex password of any length - and users don't have to remember it. 

As a security researcher and analyst, I believe that the development community could stop sighing "weakest link" and do more to support the user and business community. Security awareness training has a shelf-life of approximately two weeks according to most research. Expensive, but it provides a false sense of security.

I suggest re-thinking how development teams and designers approach user security.

Make security usable - and users will use it.

 
imbbtg
100%
0%
imbbtg,
User Rank: Apprentice
7/20/2018 | 10:17:03 AM
Awareness training is more important for phishing attack
IMHO, Phishing attack is beginning of everything and I doubt every usage of email communication can be replaced by business process. For example, IT sending out email to users to do something which can be seen as instructions to users even though it could be phishing email. Security awareness training will be required as long as email, the weakest protocol of external / internal communication that we have ever created, is still being used. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/20/2018 | 8:37:04 AM
Re: Mostly true
In my firm, I would love to have every employee know that ERR Malware is watching "everything" and we will find you.  Don't think that browsing imcognito on the web is something we cannot see - we will see it!!!   And if code of conduct violation, will act upon facts and potentially walk you out of the door!   We are not interested in the occasional mistake or mis-direct.  But continued action and plain stupid are actionable.  
danley
100%
0%
danley,
User Rank: Apprentice
7/19/2018 | 4:55:52 PM
Mostly true
I agree with most of your points. All processes must include security instead of doing it as an after thought or add on. I disagree that awareness training doesn't need to include examples of the undesired behavior. The real problem is the training never makes the motivation personal for the employee. 

You have correctly identified the problem with current awareness training in that it doesn't adequately prepare the employee. I feel that way becausse the generic training to fill the square doesn't adequately identify the risk and consequences to the employee. The employee only hears that it will lead to termination. Although this should create sufficient motivation that could affect the employee's lifestyle, the real consequence is the entire company could cease to exist affecting the lifestyle of more than just one. Additionally, the training doesn't emphasize how easily it could happen to any and every employee. Too many people see the news when it happens to someone else and never put it together that those other people are only different in that it already happened to them.

I believe there are only two catefories of people: those that have experienced a compromise and those that will. Those in the news already have. Those reading or hearing about haven't made it to the news yet.


Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.