The Ultimate Guide To Security Awareness Training - Reciprocity
The Ultimate Guide To Security Awareness Training - Reciprocity
Intro
Easy to do? Of course not. But if responsibility for security awareness training has fallen to
you, this guide can help. It will walk you through the foundational aspects of security
awareness so you can avoid common mistakes. It also provides detailed information on how
security awareness affects compliance issues to assure that you design a comprehensive
program.
Information security begins and ends with your employees. As many as 95 percent of all
cybersecurity breaches are caused by human error. That’s because no matter what
technological controls you have in place, people will always be targets for threats such as
phishing attacks or online scams. Unfortunately, employees are highly effective entry points
for cybercriminals looking to access data or infect your systems with malware.
Security awareness training is crucial to combating those risks. The key elements of
awareness are (1) knowledge, (2) understanding, and (3) attitudes about your company’s
physical and informational assets.
When your personnel are aligned on those three elements, you can feel confident that your
workforce will identify risks and take the appropriate action to protect those assets.
Awareness exists when everyone:
As of 2020, the average cost of a data breach is $3.86 million, according to a report by IBM
Security. It also takes an average of seven months for an organization even to recognize the
breach. Add another two months to contain it. For ransomware attacks alone, victim
companies pay an average of more than $111,000.
Remote work increases the risk of a threat. It has complicated compliance for many
companies that have not historically supported remote or hybrid environments. Unless you
want to become the next security breach headline, you must educate your employees.
Failure to make security as much of a priority as other parts of your job leaves you—and
your customers—at enormous risk.
Personnel at every level and in every part of your organization should undergo security
awareness training. That training, however, will need to address various levels of
competence that will exist in any organization.
Unknowing
These are people in the organization who lack security awareness and don’t even recognize
it as something they should understand. It isn’t an issue they consider as they operate day-
to-day. They rarely take any conscious steps to assure the safety of their activities or
recognize or respond to threats.
As a result, the unknowing need to be made aware of security-related issues and recognize
their lack of knowledge. Some might require additional effort to convince them that security
is important. They’ll have to be motivated to learn if you want them to get past this stage.
Unsure
These individuals know some need for security awareness exists; but they don’t know what
security looks like, or how they should participate. They might make mistakes as they try.
The good news is, they don’t need to be convinced. They recognize the value in learning
more about security and gaining the necessary competence to help assure it.
Conscious
This group of people will appreciate security risks and their duty to help mitigate those risks.
They might have received training, but keeping security top of mind or responding
appropriately still takes an extra effort.
They may have to stop and think before getting into a security mindset. It’s also likely they
often have to look up security procedures and policies, or revisit guidance on recognizing
security threats.
Second-nature
These individuals have such a high level of security awareness that they don’t have to think
consciously about staying safe. They immediately recognize threats and know how to
respond to them. Avoiding risky activities has become second nature to them. They carry
this awareness throughout the day, and possibly even at home.
Your security awareness program will need to accommodate people at different levels of
engagement within your organization. New hires, for example, should have security
awareness training as part of their onboarding process.
You might also need to implement training for contractors or vendors. In some cases,
security training is a requirement for maintaining compliance with some protocols, such as
HIPAA and NIST.
Federal security and cybersecurity awareness requirements are industry-specific, and are
often additions to long-standing regulations.
Electric utilities: The North American Electric Reliability Corp. (NERC) Critical
Infrastructure Protection Standard requires quarterly security awareness training for
personnel with access to critical cyber assets.
Federal agencies: The Federal Information Security Modernization Act (FISMA)
mandates that all federal employees and contractors undergo annual cybersecurity
awareness training.
Financial institutions: The Gramm-Leach-Bliley Act (GLBA), which determines how
financial institutions protect non-public information (NPI), requires annual
awareness training.
Healthcare: The Health Insurance Portability and Accountability Act (HIPAA) requires
annual training based on employees’ roles in accordance with FISMA.
Publicly held companies: The Sarbanes-Oxley Act (SOX) lists security awareness
training among activities for maintaining a compliant control environment for
information security.
Credit reporting agencies: The Federal Trade Commission Red Flags Rule requires
employee training to prevent identity theft.
Several states also require security awareness training. Other states encourage and provide
resources for voluntary security awareness programs. Still more address awareness with
some other guidance. Here are a few examples.
Alabama authorizes cyber training for its executive branch and provides training.
Connecticut requires cybersecurity awareness for state employees.
Georgia requires cybersecurity training for executive branch employees.
Louisiana requires cybersecurity training upon hire and annually for all state
employees.
New Jersey requires annual cybersecurity awareness training for state, county, and
municipal employees and certain state contractors.
Ohio requires and provides cybersecurity awareness training for information
system users, including employees, contractors and temporary personnel.
Pennsylvania requires yearly online security awareness training for all state
employees.
Texas mandates annual cybersecurity training for all state employees. All training
programs must be certified by the state.
Utah mandates cyber training executive branch level state employees.
Programs should be tailored to the organization, which means there is no “standard cost” an
organization should expect. Every business, however, will incur most or all of the following
costs:
Employee planning
Implementation time
Software fees
In-house or vendor administration
Communications
Again, there is no single correct method to provide training. But costs can be represented in
one or more of the following ways:
Awareness training also reduces your risk of non-compliance with regulations or protocols
that are central to your business. A small team of people can’t replicate the assurance of an
entire workforce of trained employees.
Security awareness helps protect assets of every sort. And when it is part of the
organizational culture, that level of protection can be maintained even as the threat
landscape inevitably evolves.
First, security awareness training is critical to risk management in today’s world, no matter
what; providing it is just good business. Second, as you work to achieve compliance with
what; providing it is just good business. Second, as you work to achieve compliance with
various regulatory obligations, you’ll find that most major frameworks require it.
The SANS Institute releases a yearly security awareness report to help businesses take a
data-driven approach to their cybersecurity. It highlights the benefit of having security
awareness programs run by people with technical backgrounds. They might, however, lack
the recognition or skill to communicate information in ways that engage employees
effectively.
It’s important to avoid that mistake because engaged, well-trained employees can greatly
impact your overall security.
The needs assessment conducted as part of your security awareness program will be useful
in determining whether security awareness is improving, and by how much. Personnel
should be able to demonstrate security awareness through a mix of qualitative and
quantitative feedback.
Qualitative information can come from surveys and interviews. You can also gather insights
by observing employees as they engage in awareness activities. Quantitative measurements
will include data generated by penetration tests, simulated attacks, and other activities.
PCI DSS requires interviewing a sample of personnel to verify they have completed
awareness training and are aware of the importance of cardholder data security, in addition
to acknowledging in writing that they’ve completed training. (This is a useful policy for
assuring compliance with any major protocol.)
When discussing policies such as password requirements, incident reporting, and two-factor
authentication or limited-time authorizations, employees should learn how these help
thwart security problems. Here, clarify concerns unique to insider and outsider threats.
Security breaches damage and destroy organizations every day, and there is no shortage of
real-world cases that should be used to illustrate this point. The more people understand
the risk—and their power to diminish it—the more effective your awareness training will
be.
Devices: Personal devices used for work, or work-issued devices used for personal
purposes, can blur lines and diminish employees’ vigilance when using them,
especially off-site.
Malware: How such unauthorized access works, the associated risks, and
how unsuspecting employees might be complicit — should all be clear.
Password safety: Employees must become willing to put safety over
convenience.
Phishing attacks: It’s imperative that you improve people’s ability to spot
dangerous emails.
Social engineering: Awareness means understanding that even sophisticated
technology users can be tricked into making a dangerous decision. Explain the
psychological effectiveness of scams, phone calls, fake news sites, text
messages, and social media.
Remote work: Social engineering will be a high risk for workers who are used
to working on site but have recently gone remote. So will mobile connections,
password security, and information control.
Vishing: The prevalence of potential manipulation via phone call might escape many
people’s understanding of security. Some trainings include text, chat, and direct
messages as vishing.
For the purposes of designing a security awareness program, the most important layers
include the following:
Use fans, not force. You’ll have a much better chance of changing behaviors when
you focus on business and personal benefits instead of requirements.
Share information about the current state of security, such as recent attacks and
mistakes. (But don’t single anyone out.)
Vary penetration testing so that it doesn’t become predictable.
Make sure to have a solid Incident Response Program so people can take action
quickly as their awareness increases.
Make training interactive. Self-paced modules should only be part of the training.
Celebrate wins. Security awareness training will improve security in measurable
ways; use that data to tell the positive story of everyone’s concerted efforts.
Security awareness requirements vary. Some place more emphasis on elements such as
information security, training content or cybersecurity. Some elements, however, are
consistent across frameworks. Each major compliance framework requires some form of
the following:
Here is an overview of the specific security awareness guidelines from the major
Here is an overview of the specific security awareness guidelines from the major
frameworks. Links will take you to where you can view or learn more about each standard.
Additional solutions for compliance will enhance your awareness program.
Data Protection Officers must “have due regard to the risk associated with
processing operations, taking into account the nature, scope, context and
purposes of processing.”
They are tasked with awareness-raising and training of staff involved in
processing operations, and the related audits
They must assign responsibilities and monitor compliance with GDPR,
European Union and member state data protection provisions, and other
policies.
HIPAA
NIST
SOC 2 – 2.2
Security awareness training can be highly effective. One single (and highly important) data
point is click-through rates on simulated phishing attacks. That can show just how much
difference training can make.
Studies show that the more training employees receive, the lower the click through rate will
drop. After a year of training, the click-through rate on phishing simulations can drop by 70
percent. Other data show effectiveness as high as 98 percent.
Do a needs assessment.
A baseline understanding of the existing level of security awareness among employees will
help you determine KPIs that meet your organization’s needs. It will help you understand
the biggest human risks, as well as how best to deliver your program. Key personnel should
be involved in creating this step.
Knowing how competitors have invested in security awareness can inform your efforts and
help you make the case to others in your organization, especially leadership.
Develop a strategy.
Because security awareness must become integral to your organizational culture, it should
be strategized as well as any other business decision. Convincing management or executive
buy-in and resource allocation may need to be part of your strategy (the needs assessment
can help with this).
People will get on board more easily if they know what to expect. Everyone must
understand your security awareness program’s goals and benefits and their own
responsibilities and time commitments. Managers might also appreciate clarity about how
the program will or will not impact their respective budgets.
Buy-in is so important that ISACA developed a guide to using marketing techniques. These
include creating customer personas and analyzing purchase intentions, which can help you
“sell” security awareness and training to your workforce. Your internal communication team
can help.
Identify advocates.
No single person can implement a security awareness program. Advocates can help
motivate adoption of security best practices. They can come from a diverse group including
executives, technical staff and other workers.
Employees will need guidance on how to secure their home Wi-Fi networks. Additionally,
they will need to know how to mitigate risk when using networks in public places. They
might also be contending with family or guests in their work environment, requiring specific
guidance on how others might affect the security of their work.
SANS recommends creating a community or forum for asking questions and reporting
incidents. This may be particularly useful when the on-site and remote populations shift in
response to pandemics or other emergencies.
Tips for Implementation
Sufficient staffing is key to successful implementation.
Research has shown that many full-time employees dedicated to security awareness
correlate with greater program success.
Leadership support is also critical to successful implementation. Advocacy is even
better.
Because security awareness is essentially an issue of change management, leaders
must be visible at the forefront of the cultural shift. SANS recommends you dedicate
at least four hours each month to collect and communicate the impact of your
awareness program on your leadership.
Any audit of your security training should be built from an initial benchmark of awareness
and competence levels as described above. SANS has a similar five-tier Security Awareness
Maturity Model that includes an additional final metric, the existence of a robust metrics
framework.
Because communication is integral to your security awareness program, any related internal
audit results should be shared with appropriate parties. A streamlined process for real-time
reporting enables ongoing communication about your program and its impacts.
The Zen GRC platform performs all these tasks in support of your security awareness
program. Automation leaves you free to implement and monitor security awareness
training while eliminating compliance worries. Most importantly, it enhances your ability to
understand and communicate your organization’s security status, and use a data-driven
approach to constantly improve your security program.
Learn More
READ MORE
Pricing
Reciprocity Inc.
(877) 440-7971
Privacy Policy
CONTACT US