The Top 10 Security Awareness Topics

Posted by Ragnar Sigurdsson
Find me on:

Security Awareness training is essential for companies but can be a daunting task. 

Recently the new General data protection regulation (GDPR) took effect in Europe.  Compliance is necessary for all companies and this new regulation makes it mandatory for many companies to assign a dedicated Data Protection Officer (DPO) to handle their data security affairs.  

There are a lot of things to consider with regards to GDPR, security awareness training for your employees being one of the most crucial things. That's where we can help.

It is crucial that all your people are aware of the cyber security threats out there. 

To give you an idea of what kinds of things your organisation is dealing with, here is my Top 10 list of Security Awareness Topics - the kinds of things everyone in your organisation needs to be aware of today!


blog-gdpr-security-awarenss

1. DATALEAKS

icon-dataleaksWe are human, and the fact is that behind all data leaks there is a human error.

Everyone makes mistakes.

Security awareness training guides employees on how to react to and report a leak.

It can be hard and embarrassing to admit mistakes. Creating an environment that encourages employees to report mistakes and possible leaks is very important (even if it was an accident or not their responsibility).

Duration matters when it comes to data leaks. The longer a bucket of personal or sensitive information stays open the more significant the threat of the leak.

Failure to report a leak can have severe consequences for the individual and lead to hefty fines for the company.

2. SOCIAL ENGINEERING

icon-socailengineeringYou are at the largest yearly conference in your industry. You are having fun meeting other people in similar positions and discussing how they are doing things, sharing failures and achievements and learning from each other.

After a few drinks, the sharing can go overboard, and sensitive information may be discussed and shared.

The intention of the sharing was not bad. You might not realize the serious consequences it can have if the other person is dishonest and shares classified information with someone else.

It is essential never to discuss confidential work issues with unauthorized people, even if you trust them.


3. PHISHING

icon-email-2If you open an email that happens to be a fraudulent phishing email you are just one of  8 million people in the same situation this very day.
 
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity.

The word "Phishing" is a newly coined expression created as a homophone of fishing due to the similarity of using bait in an attempt to catch a victim.

Phishing is typically carried out by email spoofing or instant messaging. It often directs users to enter personal information at a fake website which looks and feels identical to the legitimate one - the only difference may be the URL of the website in concern.



4. TAILGATING

icon-tailgaitingJohn, a former employee of the company you are working for, comes running just when you were about to close the door. He says he is going to meet his former boss. You chat for a minute or two, and then he heads towards the bosses office.

If you remember correctly, John was pretty angry when he got laid off two months ago. What you might not realize is that John, who knows his way around the company, is about to steal some sensitive information as an act of revenge.

Tailgating threats used to be related to thieves stealing physical things by following an authorized person into a secure location. However, in today's digital society tailgating is often combined with stealing sensitive information which can lead to serious financial consequences for companies.

The threat is usually associated with former employees, thieves, vandals or people that have issues with the company or employees.

5. PASSWORDS

icon-passwordsYour password expires in 2 days...

"Ughhh..." you may think, "it's that time again!" You need to come up with a password that you can easily remember, and it is harder and harder to come up with something innovative.

Passwords are crucial to protect your workstation. To create a secure password it is best to use a combination of lowercase, uppercase, symbols, and numbers.

It can make your life easier to come up with a sentence and use one letter from every word.

6. CEOSCAM

icon-ceoYou are browsing through your emails when you notice an email from your the CEO.

He claims to be in a hurry and needs you to transfer money to his account quickly.

You quickly transfer the money... But then you notice something strange; his email address is not even from your company.


This scam is a type of phishing, where cyber criminals spoof company email accounts and try to fool an employee, especially in accounting or HR.

Always double check unusual requests from your boss, especially regarding a financial transfer.

7. RANSOMWARE

icon-ransomware-1

Ransomware is a malware or a virus that encrypts the data on your computer or in some cases your whole network. After that, you cannot access your files or pictures, until you pay the ransom, and in some cases not even then.

The most common delivery mechanism of ransomware is by using a phishing scam, attachments sent via email, masquerading as a file you should trust. After they are downloaded and opened, they can take over your computer.

In some cases, ransomware is delivered to your computer via compromised websites which you think you can trust.

If you get infected, there is a small chance you may be able to recover. Check out this site for instructions: https://www.nomoreransom.org/en/index.html

Best practices to guard against ransomware:

  • Keep a backup of your files and backup regularly.
  • Do not install software unless you know exactly what it is and what it does.
  • Update your operating system and programs when prompted.
  • Never run updates in a browser window.

 

8. PRINTOUTS

icon-printoutsPrinting out documents is part of the job. Printers are sometimes located in open spaces where a lot of people can have access to them.

It is important to properly dispose of your unused documents, failed prints and not to leave them in the printer tray unsupervised for an extended period.

Information in these documents can be worth a lot of money to the wrong people.

 

9. DUMPSTERDIVING

icon-dumpsterMost companies make special efforts to keep certain types of information secret. This information can include customer lists, financial records, employee and payroll records, product development plans, and many other types of confidential information.

Methods used to protect confidential information can include high-security file cabinets, card reader systems used to control access to sensitive areas, and encrypted fax machines used to send and receive confidential information.

Despite precautions, the employees of many companies continue to throw sensitive information into the trash or recycle bins. If you don't think this is a problem at your company, make random inspections of your outgoing waste - I guarantee you will be surprised!

It is important to understand that while the information found in your trash bin on any one day may not be significant, the cumulative information gathered over a period of time can be extremely damaging.
For example, finding a copy of a few invoices in the trash wouldn't provide your competitor with a complete list of your customers, but having several months worth of your invoices probably would.

Here are some tips for you to consider:

  • Conduct periodic inspections of your outgoing trash and recycle bins.
  • Provide awareness training for all employees concerning the proper handling and disposal of confidential information.
  • For best security, consider the use of a "DOD Specification" shredder.
  • If you have large volumes of documents that must be shredded, you may wish to consider the use of a "document destruction" service.
  • Watch out for information thrown in "recycle bins".
  • Make sure that all shredded material is recycled.
  • Keep trash and recycle containers locked.


10. WIFI AT HOME & OPEN WIFI

icon-wifiA home network is often set up in a rush to get connectivity ready as soon as possible. Most people do not take any steps in securing their home network, often making them accessible to hackers.

A router is usually just a small computer with its own operating systems, software and vulnerabilities.

Often routers advertise their type and make directly in the Wireless name (SSID) making it easier for hackers to see which type the router is. This may even make it easier for them to get information about how to hack it.

Changing the router SSID and the admin username and password is the first step in securing a home WiFi. Updating a router's firmware is something that should be done on a regular basis.

Most routers fail in notifying users that an update is available even though those updates are essential to patch security holes.

It can also be necessary to restart the router every once in a while. 

A stolen mobile device is also a risk to both home and office WiFi as the device has direct access to the networks it is connected to. Remotely wiping a stolen device is something that should be done as soon as possible.

Using free public WiFi networks comes with a number of security risks, but an overwhelming majority of people use it without hesitation. The same features that make them desirable for consumers make them desirable for hackers.

The most common threat to public WiFi is the possibility for the hacker to position himself between you and the connection point, making all your traffic go directly through the hacker's computer. That wayit is easy for them to catch passwords or data that is not encrypted.

Hackers can also use public WiFi to distribute malware. If you allow file sharing on your computer, it is quite easy for a hacker to plant infected software on your computer.

Get your copy of The Essential Cyber Security Awareness Checklist! DOWNLOAD NOW!

Topics: awareness training, checklist, GDPR, security awareness