Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
The Fundamental Flaw in Security Awareness Programs
Oldest First  |  Newest First  |  Threaded View
danley
100%
0%
danley,
User Rank: Apprentice
7/19/2018 | 4:55:52 PM
Mostly true
I agree with most of your points. All processes must include security instead of doing it as an after thought or add on. I disagree that awareness training doesn't need to include examples of the undesired behavior. The real problem is the training never makes the motivation personal for the employee. 

You have correctly identified the problem with current awareness training in that it doesn't adequately prepare the employee. I feel that way becausse the generic training to fill the square doesn't adequately identify the risk and consequences to the employee. The employee only hears that it will lead to termination. Although this should create sufficient motivation that could affect the employee's lifestyle, the real consequence is the entire company could cease to exist affecting the lifestyle of more than just one. Additionally, the training doesn't emphasize how easily it could happen to any and every employee. Too many people see the news when it happens to someone else and never put it together that those other people are only different in that it already happened to them.

I believe there are only two catefories of people: those that have experienced a compromise and those that will. Those in the news already have. Those reading or hearing about haven't made it to the news yet.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
7/20/2018 | 8:37:04 AM
Re: Mostly true
In my firm, I would love to have every employee know that ERR Malware is watching "everything" and we will find you.  Don't think that browsing imcognito on the web is something we cannot see - we will see it!!!   And if code of conduct violation, will act upon facts and potentially walk you out of the door!   We are not interested in the occasional mistake or mis-direct.  But continued action and plain stupid are actionable.  
imbbtg
100%
0%
imbbtg,
User Rank: Apprentice
7/20/2018 | 10:17:03 AM
Awareness training is more important for phishing attack
IMHO, Phishing attack is beginning of everything and I doubt every usage of email communication can be replaced by business process. For example, IT sending out email to users to do something which can be seen as instructions to users even though it could be phishing email. Security awareness training will be required as long as email, the weakest protocol of external / internal communication that we have ever created, is still being used. 
cbear42
50%
50%
cbear42,
User Rank: Strategist
8/14/2018 | 8:49:21 AM
Complete Agreement on this one. . .
My concern is that there seems to be a "throw their hands in the air" approach from most development teams and in the industry when it comes to trying to ensure that employees don't make a bad security choice. They have heard the mantra that "users are the weakest link" so often and for so long that they believe there is simply nothing that THEY can do to keep users from making a bad decision.

I am currently working on a doctorate in computer science in the area of usable security. And, there ARE things that can be explored to keep users safer.

1. We can alter the visual format of security messages from one instance to the next. Security messages that morph (changing shape, color, wording) - get a user's attention. Messages that look the same and read the same put users into "autopilot". Something "different" causes them to stop and pay attention - even if only briefly. But, in that brief moment - getting their attention is critical to stopping them from making a careless mistake.

2. Security messages that make no sense to the typical end-user who is NOT a security freak or techie. 

3. We rail about insecure passwords - so why aren't password managers part of every corporate security stack? Users would need minimal training and it would go far to stop the "Post-it note"- syndrome. People select the same password over and over because they can remember it. A password manager can generate a new and complex password of any length - and users don't have to remember it. 

As a security researcher and analyst, I believe that the development community could stop sighing "weakest link" and do more to support the user and business community. Security awareness training has a shelf-life of approximately two weeks according to most research. Expensive, but it provides a false sense of security.

I suggest re-thinking how development teams and designers approach user security.

Make security usable - and users will use it.

 


Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9342
PUBLISHED: 2020-02-22
The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper.
CVE-2020-9338
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the "Your SoPlanning url" field.
CVE-2020-9339
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the Name or Comment to status.php.
CVE-2020-9340
PUBLISHED: 2020-02-22
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter.
CVE-2020-9341
PUBLISHED: 2020-02-22
CandidATS 2.1.0 is vulnerable to CSRF that allows for an administrator account to be added via the index.php?m=settings&a=addUser URI.