When I was new to the security industry, I firmly believed that people got infected with malware because they didn’t know how to be safe online. I thought problems happened because computers were too complicated, or the technology was too daunting, or people were just too trusting and naive. But clearly I knew better. I saw the dangers lurking on the internet and knew how attacks worked, so all I had to do to end the risk of insider threats was tell people how to protect themselves.

If you guessed that I’ve since learned I was the naive one, you are correct. While I still feel that security education is crucial, I no longer believe that a lack of security awareness is the biggest reason why cybercrime is still a problem. There’s plenty of information available to us on how to protect ourselves, and yet malware attacks and data breaches keep occurring.

Security Is Obtainable in a World of Insider Threats

There are plenty who would say that issues around malware and similar threats are due to people being stubborn, lazy or ignorant of how much damage a security incident can cause. Most security awareness campaigns are based around these assumptions.

While I won’t discount the possibility that some people simply need a little more information or are obstinate about doing things safely, most people want to improve security because it’s something that genuinely concerns them. However, the vast majority of people also have other priorities that don’t seem to be in step with traditional security policies at first glance.

Typically, security rules are all about locking things down: Don’t click this, don’t go to that site, don’t use that app. But that isn’t how security experts always operate. We exercise everyday vigilance and use a combination of tools to protect against insider threats and outside attacks. We also set up sandboxes where we can safely examine files we think might be problematic and check out suspicious websites or dodgy apps. If we can do this for ourselves, there’s no reason we can’t set up systems that allow everyone in the office to do their jobs effectively and securely.

What Can We Do to Promote Safer Use?

Enabling users to work safely cannot be accomplished with a one-size-fits-all solution. Mandating that all users follow a single, monolithic set of security rules may seem like a simple approach, but if that policy disallows necessary tools and processes, users are either going to be less productive or implement shadow IT options, which can put data at greater risk. Adopting a more nuanced stance can decrease costs and improve performance in the long run.

Understand What Your Coworkers Need

The first thing you need to do to enable safer usage is find out which apps and services people in your organization need to do their jobs and which ones they don’t need. For some employees, this may be as simple as locking down unapproved apps and services or unnecessary functionalities. Other employees may require more complex setups; you might give them a sandbox where they can open unexpected attachments safely, or they may need more advanced training on how to handle suspicious attachments.

Make Safety Easier

Modern software allows people to perform a lot of powerful functions with little or no thought. Unfortunately, this degree of functionality can encourage people to do things that decrease their security. What’s more, most security technologies introduce hurdles that can decrease functionality. The key word here is “most.”

It is possible to find security tools that introduce only minor hurdles, and it’s also possible to set up your security architecture in a way that makes opting for insecure actions more burdensome. Also, there’s something to be said for choosing a realistic security model instead of trying to achieve the “perfect” situation and failing. Remember that many of the security “best practices” we cling to have been disproved.

Address Both Dos and Don’ts

So much of what we tell people about online safety is what they shouldn’t do, without any advice on what they should do. This can lead to workflow paralysis or worse — some people may feel so overwhelmed by the threat of cybercrime that they simply give up trying to protect themselves because it feels futile.

To counteract these frustrations, you could remind your associates how effective multifactor authentication (MFA) is. You could tell them how using encryption can decrease damages to customers and costs for the business if there is a security incident. The objective here is to empower employees with security awareness, not to scare them into compliance.

Make Staff Your Network’s Eyes and Ears

Even the biggest security team can’t be everywhere or recognize all insider threats in their environment. Establishing relationships with employees from all departments can facilitate mutual communication and encourage employees to come to you if they see something suspicious or are involved in an accident. This can help with identifying potential problems, such as runaway shadow IT or other unmonitored assets, and decreasing the time it takes to spot security incidents.

Don’t Be Afraid to Put Your Foot Down

There will be times when you simply have to say “no” to requests for increased functionality. Sometimes, this will be because you don’t have the time or money to offer the requested app or service safely, and sometimes, it will be because that option just can’t be sufficiently secured. In either case, you’ll win a lot more support by clearly and succinctly explaining the reasoning behind your decision, especially if it’s something you may be able to reconsider in the future.

There’s a certain irony in the declaration: “I’ve seen how the world works, and if I just tell you how to protect yourself better, suddenly everything will magically improve.” I know now that this isn’t how the story actually goes, but I also know that addressing people as equals when we talk about improving security is the first step in discovering what will truly move the needle toward meaningful change. After all, we security professionals are human too, and sometimes, even the experts need to learn new ways of considering security.

Learn more about insider threats in the X-Force Threat Intelligence Index 2020

More from CISO

How to Solve the People Problem in Cybersecurity

You may think this article is going to discuss how users are one of the biggest challenges to cybersecurity. After all, employees are known to click on unverified links, download malicious files and neglect to change their passwords. And then there are those who use their personal devices for business purposes and put the network at risk. Yes, all those people can cause issues for cybersecurity. But the people who are usually blamed for cybersecurity issues wouldn’t have such an…

The Cyber Battle: Why We Need More Women to Win it

It is a well-known fact that the cybersecurity industry lacks people and is in need of more skilled cyber professionals every day. In 2022, the industry was short of more than 3 million people. This is in the context of workforce growth by almost half a million in 2021 year over year per recent research. Stemming from the lack of professionals, diversity — or as the UN says, “leaving nobody behind” — becomes difficult to realize. In 2021, women made…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

Detecting the Undetected: The Risk to Your Info

IBM’s Advanced Threat Detection and Response Team (ATDR) has seen an increase in the malware family known as information stealers in the wild over the past year. Info stealers are malware with the capability of scanning for and exfiltrating data and credentials from your device. When executed, they begin scanning for and copying various directories that usually contain some sort of sensitive information or credentials including web and login data from Chrome, Firefox, and Microsoft Edge. In other instances, they…