Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

11/29/2016
10:00 AM
Lysa Myers
Lysa Myers
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Cybersecurity User Training That Sticks: 3 Steps

People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.

Imagine yourself at a street corner with your preschool-aged child. Knowing that we all want our children to be able to cross the street on their own someday, what do you say to help educate and prepare them? We want to explain it thoroughly, so that they can move safely through the world, right?

How about: “Hey honey, do you see that car? It weighs approximately two tons, and is traveling at a speed of 36 miles per hour. Given that the average human walking speed is about 3 miles per hour, and the braking time for a car that size traveling that speed…”

Well, okay, maybe that’s a bit too much for a toddler. 

Or perhaps we should start with “Sweetheart, if you aren’t careful when you cross the street, you could be seriously injured or killed by cars. There were 347 pedestrians killed in traffic in California last year!”

While this is true, it’s liable to leave them feeling terrified, overwhelmed, and powerless.

There are ways to train -  even the most novice individuals - to pilot their way competently through a high-risk and complex scenario without overloading or traumatizing them. With simple instructions like “look both ways before crossing,” most of us manage to exit childhood with a solid understanding of how to safely navigate an intersection.

Why can’t we do the same thing for something as broad and technically challenging as computer security? The solution is to start simple, then break down the message into more complex instructions:

Start with aspirational advice
Stop, drop, and roll.” “Give a hoot – don’t pollute.” “Take a bite out of crime.” These slogans are intended to motivate people to change their behavior and to anchor actions to a simple, positive and memorable phrase. A group led by the National Cyber Security Alliance (NCSA) and the APWG has been creating a list of slogans intended to help people take control of their computer security, for instance: “Keep a clean machine,” “Share with care,” and “Lock down your login.”

Expand advice with tips
The crucial part of looking both ways before crossing is not so much the looking, but in pausing to observe hazards. So the next step in educating people is to give a little more information.

Tips should help clarify the slogans to explain succinctly what people should be doing to protect themselves. In the case of street crossing, this generally includes instructions about where it is safe to cross, looking and listening for hazards, and then finally crossing quickly and safely when the way is clear. In the case of computer safety advice, this should also include a list of actions they should take to identify and avoid hazards.

Using logins as an example, this should include tips for creating a strong password or passphrase, using unique passwords for each account, and enabling multi-factor authentication when possible. Here’s a list of resources for other online security topics.

Finally, specific technical steps
It’s natural that people will have questions about specific situations that you may want to answer proactively, or there may be certain caveats or nuances that need clarification. After introducing the advice and then clarifying it briefly, you can provide more detailed technical information for those who want or need it.

In the case of logins, for example, you might want to explain that there may be additional hazards like shoulder-surfing and phishing where you need to be more cautious about inputting your credentials. Or, you may want to give more clarification about how to enable multi-factor authentication, or what to expect when it’s in place. 

The world is not short of scary stories about the dangers lurking online, and this is leading people to feel like there is little they can do to mitigate risk. People are eager for common-sense cybersecurity advice that gives them control and helps keep them stay safer online. No one expects that we can completely eliminate accidents or online crime overnight, but we can all sleep a little easier if we know that we’re doing our best to observe and control our environment.

Related Content:

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9342
PUBLISHED: 2020-02-22
The F-Secure AV parsing engine before 2020-02-05 allows virus-detection bypass via crafted Compression Method data in a GZIP archive. This affects versions before 17.0.605.474 (on Linux) of Cloud Protection For Salesforce, Email and Server Security, and Internet GateKeeper.
CVE-2020-9338
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the "Your SoPlanning url" field.
CVE-2020-9339
PUBLISHED: 2020-02-22
SOPlanning 1.45 allows XSS via the Name or Comment to status.php.
CVE-2020-9340
PUBLISHED: 2020-02-22
fauzantrif eLection 2.0 has SQL Injection via the admin/ajax/op_kandidat.php id parameter.
CVE-2020-9341
PUBLISHED: 2020-02-22
CandidATS 2.1.0 is vulnerable to CSRF that allows for an administrator account to be added via the index.php?m=settings&a=addUser URI.