In the football world, we often hear that the best defense is good offense. Can we also apply that principle to our IT environments and user education initiatives?

The Best Defense

IT leaders must continuously verify and combat new threats, insiders, malware techniques or other forms of attacks. Security analysts are always running to investigate events and flows using software and tools. Obviously, these tools are crucial to help IT professionals organize their initial security programs and later bolster their defenses. But what is the most important attention point for a security team?

The imperative is always the same: Reduce the elapsed time between the violation and the remediation. That requires hard work, especially when privileged users are involved. It also requires a big budget, since reliable software solutions are expensive. There is, however, a more rudimentary yet effective defense mechanism that won’t break the bank: user education.

The Value of User Education

Education is fundamental in every discipline — in ordinary life, at work, and in the context of social groups, relationships and the digital world. Still, IT leaders too often undervalue user education and user behavior analytics (UBA), which creates opportunities for attackers.

In fact, threat actors constantly monitor users’ activities to identify potential vulnerabilities to exploit. Meanwhile, security teams are merely playing defense. But before taking an offensive stand against these threats, organizations must thoroughly train their employees to adopt good security practices.

Think of everyday valuables such as your wallet, smartphone and keys. You always know where they are and how they are being used. Employees must protect their identities, passwords and devices with the same level of vigilance.

This is where security awareness and education initiatives can step in and help. Users need to know how to create complex passwords and change them periodically. Whenever possible, they should use multifactor authentication when logging into sensitive accounts. Furthermore, employees should know which devices they’re expected to use, who else can access them and how they’re secured.

A Breach Is Just a Click Away

As a general rule, users should assume that each mouse click or keystroke represents the origin of a possible attack. They must also establish definitive trust before sharing any sensitive information, the same way they would treat a face-to-face interaction.

Think of traditional mail, for example. First we see the sender address and postal stamp, then we open the envelope and read the letter. We cannot click links, execute commands or open files that might lead to cyberattacks — instead, we must read, read and read again before acting. Users need to apply this principle to their online safety practices.

It seems like an impossible task, but it really isn’t. It’s just a matter of educating users, establishing good habits and spreading awareness — three invaluable security solutions any organization can afford.

More from Risk Management

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today