![]() |
|||||||||||||
![]() |
|||||||||||||
![]() |
|||||||||||||
![]() |
|||||||||||||
![]() |
|||||||||||||
|
|||||||||||||
The Weakest Link Getting Employees to Actively Buy in to Information Security Apart from those whose job it is to secure company information, does any one else care? After all, it's the Information Security department's responsibility to safeguard company information, right? WRONG! That's like thinking you don't have to put your own litter in the trash because the garbage collector will do it for you. Effective information security can't happen without help from every employee, contractor, consultant, vendor and strategic partner. The company can't guarantee information security unless everyone contributes to the cause. Information security departments are akin to the police -- they provide policies, services and guidelines that govern how you protect company information. But they can't be there to protect you in every situation. Sure, the IS department maintains high-tech monitoring equipment and secures the firewall. But think about the information security breaches that occur outside the company fortress. A laptop computer containing essential trade secrets getting stolen at the airport, a hacker getting into the system via an easily cracked password, or an office computer carelessly left connected to the network for anyone to come along and use. Consider, too, the threats that don't even involve technology -- information innocently given out over the phone, an overheard elevator conversation and overflowing in-boxes just waiting to be searched. Who do you think is on the front line in these cases? To compound things, disgruntled employees (both former and current), clever hackers, snooping competitors and evil virus creators worked overtime to infiltrate information security systems in 1997. Attacks are on the rise and security breaches cost more
What if an attack happened at your company? Even a simple 'hoax' virus message (not a real virus, but a fictitious warning about one that gets passed around by employees) can clog your e-mail system, shutting it down or considerably slowing mail delivery while it tries to process the huge overload of hoax messages. Passwords are another problem. Most people pick passwords that are easily guessed, or worse yet, appear in some form on their desktop (the name of a pet, a favorite sports team, the name of a current project, etc.). If a hacker gets hold of a live password, he can access your company's top-level files in a matter of minutes. You can see how important employees are to minimizing technical security risks, but don't forget all the other ways information can leak out of a company. For instance, a number of people on the commuter train overhear a conversation between two employees about the new marketing plan, or an employee leaves sensitive information unprotected on her desktop or inbox. Another employee throws the early drafts of a key strategic plan in his trash can. Had these employees understood information security and what role they play, these potentially costly leaks could have been prevented. How do you gain employee support? Don't think you're off the hook just because you've published countless memos on the policies that govern information security. Chances are excellent they're dull and dry and no one is reading them. In this age of information overload, you must cut through the clutter with the right communication to get anyone to listen, much less act. Treat your communication campaign as a highly creative endeavor. Better yet, think like an advertiser. Consider the current anti-bacteria, salmonella/e-coli craze that has everyone overcooking food and throwing away leftovers. The makers of household cleaning products helped perpetuate this frenzy by re-packaging their products with germ-killing ingredients, and making us believe that extreme danger exists on every single surface in our homes. It's enough to spur most of us into germ warfare. You have to do the same thing with your information security campaign. It has to reach people in a way that makes them want to take action. Boil down your policies into specifics. Make it fun, make it scary, have a contest, or create a campaign icon. Have a brainstorming session with your colleagues. There are a lot of ways you can approach your campaign. The important thing is to just get started -- post haste. Infiltrators and other nasty information thieves are busy chipping away at your company's defenses right now. Ivy Sea Consulting Services: This information provides food for thought rather than counsel specifically designed to meet the unique needs of your organization.Visit About Ivy Sea or give us a call to learn how we can help you discover how to make the most of your culture, communication, talents, services, infrastructure and systems to take you to greater levels of mastery and success as an individual, group or organization. How can we help you? We welcome your email inquiry. Giving back: Ivy Sea Online is provided as a public-service resource available to all. If you appreciate the inspiration and free resources available to you on Ivy Sea Online, consider leaving a tip to help keep the generosity flowing. Even the smallest contribution helps to offset the costs of developing and maintaining this public-service site, and contributing is as easy as can be! Thank you! |
|||||||||||||
![]() |
|||||||||||||
![]() |
|||||||||||||
Articles & Tips Archive
What else would you like to see us cover? What are your key leadership and communication issues or experiences in the workplace? |
|||||||||||||
|
|||||||||||||
![]() |
|||||||||||||
![]() |
|||||||||||||