Circa 2002, I was baggy pantsed. Baggy pantsing is the act of teaching someone a lesson when he or she leaves a computer unattended with an unlocked screen. The jokester typically sends an embarrassing email to an internal distribution list pretending to be the unwary victim — in this case, me.

The email sent on my behalf read: “My name is Michelle, and I’m wearing baggy pants!” Not too terrible, but I had joined a company where security awareness was ingrained in the organizational culture at a time when security wasn’t necessarily a popular media buzzword or a boardroom-level topic of discussion. So being “pantsed” marked me as a bit of a security “newb” at my new job.

Fast-forward to today: I never walk away and leave my screen unlocked anymore, and security is in fashion. The security pendulum has swung from unfamiliarity to awareness within many organizations thanks to a barrage of ever-changing cyberthreats and countless massive breaches affecting all industry sectors for the past decade.

However, even after “the year the Internet fell apart,” there are still organizations that have been slow to embrace security awareness as part of their culture. Although a cultural change is sometimes understood to be necessary, effecting that change is challenging. It requires modification to an organization’s values and traditions that are often deep-rooted within the enterprise.

As we enter week two of National Cyber Security Awareness Month (NCSAM), organizations should be asking themselves, “Do we promote a culture of cybersecurity at work?” If the answer is no, then they may be missing an important step to thwarting cyber threats.

It’s Not Meatloaf: The Importance of Implementing Step Four

You know how sometimes you can skip or substitute an ingredient in a recipe and it doesn’t really change the final product too much? Well, the same does not apply to the methodology of responding to — and recovering from — sophisticated security attacks. The four steps are as follows:

  1. Prioritize your business objectives and set your risk tolerance.
  2. Protect your organization with a proactive security plan.
  3. Prepare your response plan to the inevitable sophisticated attack.
  4. Promote and support a culture of security awareness.

The last step, promoting and supporting a culture of security awareness, reinforces each of the preceding steps. Take step two, for instance. Your organization may develop well-designed security policies to defend against sophisticated attacks, but employees are less likely to adhere to them without a good understanding of why those policies exist in the first place.

Similarly, your organization may assign an incident coordination role to someone (step three), but if that individual doesn’t comprehend the potential gravity of a breach, he or she may be less effective at detecting, remediating and containing the incident.

Extend Security Awareness Beyond the IT Staff

According to the “2015 Cyber Security Intelligence Index,” nearly 24 percent of attacks were carried out by an inadvertent actor. This involves any attack or suspicious activity sourcing from an IP address inside an organization’s network that is allegedly being executed without the knowledge of the user. These attacks could also be the result of an employee clicking on a malicious attachment in a phishing email.

This finding supports the need to extend security awareness beyond the IT staff to every person within the company as many of today’s insider threats stem from user error, not malice. Even placing sensitive files in the cloud for safekeeping could put the company at risk.

The importance of security should inform every decision and procedure at every level of the organization. Secure procedures, like locking your computer screen when unattended, need to become second nature. The process of changing a company’s culture can be enormously challenging. Why not start now on the path towards embracing a culture of security by formulating and delivering communication on the importance of improving security and teaching employees to recognize and report possible security problems? Failing to promote and support a culture of security awareness could potentially result in much graver consequences than a practical joke.

More from Intelligence & Analytics

2022 Industry Threat Recap: Manufacturing

It seems like yesterday that industries were fumbling to understand the threats posed by post-pandemic economic and technological changes. While every disruption provides opportunities for positive change, it's hard to ignore the impact that global supply chains, rising labor costs, digital currency and environmental regulations have had on commerce worldwide. Many sectors are starting to see the light at the end of the tunnel. But 2022 has shown us that manufacturing still faces some dark clouds ahead when combatting persistent…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…

The 13 Costliest Cyberattacks of 2022: Looking Back

2022 has shaped up to be a pricey year for victims of cyberattacks. Cyberattacks continue to target critical infrastructures such as health systems, small government agencies and educational institutions. Ransomware remains a popular attack method for large and small targets alike. While organizations may choose not to disclose the costs associated with a cyberattack, the loss of consumer trust will always be a risk after any significant attack. Let’s look at the 13 costliest cyberattacks of the past year and…