Ask any IT security professional and you’ll get the same answer. One of the biggest cybersecurity challenges is the human factor, making cybersecurity awareness more vital than ever in our mobilized, interconnected world.

According to the 2014 Cyber Security Intelligence Index, an astounding 95 percent of all security incidents involve human error. The most prevalent mistake? Double clicking on an infected attachment or unsafe URL. Other common errors include lack of patching, using default user names and passwords and easy-to-guess passwords, lost laptops and mobile devices, and inadvertent disclosure of sensitive information by use of an incorrect email address.

Support and Participate in National Cybersecurity Awareness Month

All the more reason to support and participate in National Cybersecurity Awareness Month, which is observed in October in the U.S., with similar months or weeks set aside in other countries. Cybersecurity awareness events like these are valuable opportunities to shine a spotlight on what it means to be aware and how to promote not only knowledge, but deliberate, mindful behavior to actively protect valuable data and information in our businesses and communities.

What is cybersecurity awareness? It’s not just knowledge. Knowing isn’t doing. Security awareness is knowledge combined with attitudes and behaviors that serve to protect our information assets. Being cybersecurity aware means you understand what the threats are and you take the right steps to prevent them.

At IBM, we work to create a risk-aware culture where employees are educated about the cybersecurity hazards we face and trained to take the right actions to defend against them. Training courses, simulated phishing exercises, awareness campaigns, videos and a steady stream of awareness messaging and social media conversations are some of the ways we work to keep cybersecurity top of mind among IBMers.

For our families and communities, we encourage employees to visit the StaySafeOnline and Stop.Think.Connect websites to cultivate cyber awareness at home and in their neighborhoods. StaySafeOnline offers tips and resources, including content for teaching cybersecurity to students from kindergarten through college. The Stop.Think.Connect. site offers information on how to protect our digital lives online.

Internet Safety: Time to Stop Kidding Around?

We’re all in this together, and each of us has a stake in reducing human error and encouraging cybersecurity best practices in our workplaces, homes and communities. Help spread the word to promote a safer, more productive digital experience for all of us.

More from CISO

Bridging the 3.4 Million Workforce Gap in Cybersecurity

As new cybersecurity threats continue to loom, the industry is running short of workers to face them. The 2022 (ISC)2 Cybersecurity Workforce Study identified a 3.4 million worldwide cybersecurity worker gap; the total existing workforce is estimated at 4.7 million. Yet despite adding workers this past year, that gap continued to widen. Nearly 12,000 participants in that study felt that additional staff would have a hugely positive impact on their ability to perform their duties. More hires would boost proper…

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the organization's defenses against cyberattacks. However, while many organizations don't question the value of a CISO, there should be more debate over who this important role…

Everyone Wants to Build a Cyber Range: Should You?

In the last few years, IBM X-Force has seen an unprecedented increase in requests to build cyber ranges. By cyber ranges, we mean facilities or online spaces that enable team training and exercises of cyberattack responses. Companies understand the need to drill their plans based on real-world conditions and using real tools, attacks and procedures. What’s driving this increased demand? The increase in remote and hybrid work models emerging from the COVID-19 pandemic has elevated the priority to collaborate and…

Why Quantum Computing Capabilities Are Creating Security Vulnerabilities Today

Quantum computing capabilities are already impacting your organization. While data encryption and operational disruption have long troubled Chief Information Security Officers (CISOs), the threat posed by emerging quantum computing capabilities is far more profound and immediate. Indeed, quantum computing poses an existential risk to the classical encryption protocols that enable virtually all digital transactions. Over the next several years, widespread data encryption mechanisms, such as public-key cryptography (PKC), could become vulnerable. Any classically encrypted communication could be wiretapped and is…