Awareness, training, compliance, and transparency
Digital awareness needs top-down sponsorship, but it begins from the bottom up, ensuring every employee is trained on the dangers of cyber weaknesses. This can range from cyber simulations to internal phishing exercises, but while conducting this type of cybersecurity training is a well-known practice, its effectiveness depends on factors such as sensitivity to humanistic values, frequency of training, and customization.
Empathy and enablement
Sending phishing emails to employees in a controlled environment is one of the most popular training exercises, testing which employees interact with a suspicious link and take the bait. While effective, these tests must be conducted in a safe culture that fosters empathy and enablement, educating staff and motivating them to protect the organization, rather than create a blame or fear culture within.
Continuous and customized training
Like most things, organizations should also commit to continuous learning in small increments rather than an annual exercise. This is particularly important for IT and Financial areas, which are the primary targets for social engineering.
Compliance
The story of the RMS Titanic serves as a reminder that regulatory compliance does not guarantee safety or security. Despite having 24 lifeboats, four more than required by the British Board of Trade, when the ship sank in 1912, they were still not enough to save the 1,500 casualties. Organizations must adopt a substantive approach to compliance, moving beyond a “tick-the-box” mentality and committing to meeting and exceeding expectations.
Transparency
Keeping the British theme, in the fall of 2023, we saw the UK National Library fall victim to a major ransomware attack that severely disrupted its operations and compromised sensitive data. The institution decided on a strategy of full transparency, producing and publishing a detailed report on the causes and nature of the attack and its initial recovery. The report offered important lessons for government organizations, NGOs, and businesses about cybersecurity vulnerabilities and crisis management. The British Library’s report went beyond merely explaining what happened and why; it outlined lessons learned and planned changes. This comprehensive approach should be considered standard practice and could potentially be incorporated into government expectations for private companies when they experience a breach.
The attack demonstrates that even institutions with extensive security measures can fall victim to sophisticated cybercriminals. Continual investment in modernizing infrastructure, enhancing security controls, and fostering a security-conscious culture is essential. The potential costs of prevention are far outweighed by the devastating impact of a successful attack on an institution’s operations and reputation.