October 6, 2015 By Michelle Alvarez 3 min read

Circa 2002, I was baggy pantsed. Baggy pantsing is the act of teaching someone a lesson when he or she leaves a computer unattended with an unlocked screen. The jokester typically sends an embarrassing email to an internal distribution list pretending to be the unwary victim — in this case, me.

The email sent on my behalf read: “My name is Michelle, and I’m wearing baggy pants!” Not too terrible, but I had joined a company where security awareness was ingrained in the organizational culture at a time when security wasn’t necessarily a popular media buzzword or a boardroom-level topic of discussion. So being “pantsed” marked me as a bit of a security “newb” at my new job.

Fast-forward to today: I never walk away and leave my screen unlocked anymore, and security is in fashion. The security pendulum has swung from unfamiliarity to awareness within many organizations thanks to a barrage of ever-changing cyberthreats and countless massive breaches affecting all industry sectors for the past decade.

However, even after “the year the Internet fell apart,” there are still organizations that have been slow to embrace security awareness as part of their culture. Although a cultural change is sometimes understood to be necessary, effecting that change is challenging. It requires modification to an organization’s values and traditions that are often deep-rooted within the enterprise.

As we enter week two of National Cyber Security Awareness Month (NCSAM), organizations should be asking themselves, “Do we promote a culture of cybersecurity at work?” If the answer is no, then they may be missing an important step to thwarting cyber threats.

It’s Not Meatloaf: The Importance of Implementing Step Four

You know how sometimes you can skip or substitute an ingredient in a recipe and it doesn’t really change the final product too much? Well, the same does not apply to the methodology of responding to — and recovering from — sophisticated security attacks. The four steps are as follows:

  1. Prioritize your business objectives and set your risk tolerance.
  2. Protect your organization with a proactive security plan.
  3. Prepare your response plan to the inevitable sophisticated attack.
  4. Promote and support a culture of security awareness.

The last step, promoting and supporting a culture of security awareness, reinforces each of the preceding steps. Take step two, for instance. Your organization may develop well-designed security policies to defend against sophisticated attacks, but employees are less likely to adhere to them without a good understanding of why those policies exist in the first place.

Similarly, your organization may assign an incident coordination role to someone (step three), but if that individual doesn’t comprehend the potential gravity of a breach, he or she may be less effective at detecting, remediating and containing the incident.

Extend Security Awareness Beyond the IT Staff

According to the “2015 Cyber Security Intelligence Index,” nearly 24 percent of attacks were carried out by an inadvertent actor. This involves any attack or suspicious activity sourcing from an IP address inside an organization’s network that is allegedly being executed without the knowledge of the user. These attacks could also be the result of an employee clicking on a malicious attachment in a phishing email.

This finding supports the need to extend security awareness beyond the IT staff to every person within the company as many of today’s insider threats stem from user error, not malice. Even placing sensitive files in the cloud for safekeeping could put the company at risk.

The importance of security should inform every decision and procedure at every level of the organization. Secure procedures, like locking your computer screen when unattended, need to become second nature. The process of changing a company’s culture can be enormously challenging. Why not start now on the path towards embracing a culture of security by formulating and delivering communication on the importance of improving security and teaching employees to recognize and report possible security problems? Failing to promote and support a culture of security awareness could potentially result in much graver consequences than a practical joke.

More from Intelligence & Analytics

What makes a trailblazer? Inspired by John Mulaney’s Dreamforce roast

4 min read - When you bring a comedian to offer a keynote address, you need to expect the unexpected.But it is a good bet that no one in the crowd at Salesforce’s Dreamforce conference expected John Mulaney to tell a crowd of thousands of tech trailblazers that they were, in fact, not trailblazers at all.“The fact that there are 45,000 ‘trailblazers’ here couldn’t devalue the title anymore,” Mulaney told the audience.Maybe it was meant as nothing more than a punch line, but Mulaney’s…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Protecting your data and environment from unknown external risks

3 min read - Cybersecurity professionals always keep their eye out for trends and patterns to stay one step ahead of cyber criminals. The IBM X-Force does the same when working with customers. Over the past few years, clients have often asked the team about threats outside their internal environment, such as data leakage, brand impersonation, stolen credentials and phishing sites. To help customers overcome these often unknown and unexpected risks that are often outside of their control, the team created Cyber Exposure Insights…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today