Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

11/29/2016
10:00 AM
Lysa Myers
Lysa Myers
Commentary
Connect Directly
Facebook
Twitter
LinkedIn
RSS
E-Mail vvv
100%
0%

Cybersecurity User Training That Sticks: 3 Steps

People are eager for common-sense advice that gives them control over their environment and helps them stay safe online.

Imagine yourself at a street corner with your preschool-aged child. Knowing that we all want our children to be able to cross the street on their own someday, what do you say to help educate and prepare them? We want to explain it thoroughly, so that they can move safely through the world, right?

How about: “Hey honey, do you see that car? It weighs approximately two tons, and is traveling at a speed of 36 miles per hour. Given that the average human walking speed is about 3 miles per hour, and the braking time for a car that size traveling that speed…”

Well, okay, maybe that’s a bit too much for a toddler. 

Or perhaps we should start with “Sweetheart, if you aren’t careful when you cross the street, you could be seriously injured or killed by cars. There were 347 pedestrians killed in traffic in California last year!”

While this is true, it’s liable to leave them feeling terrified, overwhelmed, and powerless.

There are ways to train -  even the most novice individuals - to pilot their way competently through a high-risk and complex scenario without overloading or traumatizing them. With simple instructions like “look both ways before crossing,” most of us manage to exit childhood with a solid understanding of how to safely navigate an intersection.

Why can’t we do the same thing for something as broad and technically challenging as computer security? The solution is to start simple, then break down the message into more complex instructions:

Start with aspirational advice
Stop, drop, and roll.” “Give a hoot – don’t pollute.” “Take a bite out of crime.” These slogans are intended to motivate people to change their behavior and to anchor actions to a simple, positive and memorable phrase. A group led by the National Cyber Security Alliance (NCSA) and the APWG has been creating a list of slogans intended to help people take control of their computer security, for instance: “Keep a clean machine,” “Share with care,” and “Lock down your login.”

Expand advice with tips
The crucial part of looking both ways before crossing is not so much the looking, but in pausing to observe hazards. So the next step in educating people is to give a little more information.

Tips should help clarify the slogans to explain succinctly what people should be doing to protect themselves. In the case of street crossing, this generally includes instructions about where it is safe to cross, looking and listening for hazards, and then finally crossing quickly and safely when the way is clear. In the case of computer safety advice, this should also include a list of actions they should take to identify and avoid hazards.

Using logins as an example, this should include tips for creating a strong password or passphrase, using unique passwords for each account, and enabling multi-factor authentication when possible. Here’s a list of resources for other online security topics.

Finally, specific technical steps
It’s natural that people will have questions about specific situations that you may want to answer proactively, or there may be certain caveats or nuances that need clarification. After introducing the advice and then clarifying it briefly, you can provide more detailed technical information for those who want or need it.

In the case of logins, for example, you might want to explain that there may be additional hazards like shoulder-surfing and phishing where you need to be more cautious about inputting your credentials. Or, you may want to give more clarification about how to enable multi-factor authentication, or what to expect when it’s in place. 

The world is not short of scary stories about the dangers lurking online, and this is leading people to feel like there is little they can do to mitigate risk. People are eager for common-sense cybersecurity advice that gives them control and helps keep them stay safer online. No one expects that we can completely eliminate accidents or online crime overnight, but we can all sleep a little easier if we know that we’re doing our best to observe and control our environment.

Related Content:

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
Preventing PTSD and Burnout for Cybersecurity Professionals
Craig Hinkley, CEO, WhiteHat Security,  9/16/2019
NetCAT Vulnerability Is Out of the Bag
Dark Reading Staff 9/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3738
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Improper Verification of Cryptographic Signature vulnerability. A malicious remote attacker could potentially exploit this vulnerability to coerce two parties into computing the same predictable shared key.
CVE-2019-3739
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to Information Exposure Through Timing Discrepancy vulnerabilities during ECDSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover ECDSA keys.
CVE-2019-3740
PUBLISHED: 2019-09-18
RSA BSAFE Crypto-J versions prior to 6.2.5 are vulnerable to an Information Exposure Through Timing Discrepancy vulnerabilities during DSA key generation. A malicious remote attacker could potentially exploit those vulnerabilities to recover DSA keys.
CVE-2019-3756
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P3 (6.6.0.3), contain an information disclosure vulnerability. Information relating to the backend database gets disclosed to low-privileged RSA Archer users' UI under certain error conditions.
CVE-2019-3758
PUBLISHED: 2019-09-18
RSA Archer, versions prior to 6.6 P2 (6.6.0.2), contain an improper authentication vulnerability. The vulnerability allows sysadmins to create user accounts with insufficient credentials. Unauthenticated attackers could gain unauthorized access to the system using those accounts.