You are about to leave Risk Strategies website and view the content of an external website.
You are leaving risk-strategies.com
By accessing this link, you will be leaving Risk Strategies website and entering a website hosted by another party. Please be advised that you will no longer be subject to, or under the protection of, the privacy and security policies of Risk Strategies website. We encourage you to read and evaluate the privacy and security policies of the site you are entering, which may be different than those of Risk Strategies.
Cyber threats are escalating. Reports from IBM show that cyberattacks using stolen or compromised credentials surged by 71%, year-over-year in 2023, and 32% of cyber incidents involve data theft and leaks. This indicates a shift towards stealing and selling data rather than encrypting it for ransom. The human element is often the weakest link in cybersecurity risk management. Creating a "human firewall" can significantly fortify your business against these threats. To better understand this concept, let's explore the human factors that play a crucial role.
Research from Stanford University and Tessian shows that human factors account for more than 80% of cyber incidents. Common human errors include:
For example, Change Healthcare faced a major data breach due to employees bypassing multi-factor authentication (MFA). Hackers accessed sensitive patient data, resulting in significant financial and reputational damage. One effective strategy to reduce risks such as these is implementing a human firewall.
A human firewall consists of employees who act as the first line of defense against cyber threats. Unlike traditional cybersecurity measures that rely on technology, a human firewall underscores the critical role of trained and vigilant staff.
Turning your staff into diligent defenders against cyber threats can make a huge difference. Here are two real-world examples that illustrate the effectiveness of a human firewall in different sectors:
Building an effective human firewall also involves understanding the cognitive and cultural factors that influence employee behavior.
Employees often take the path of least resistance, making decisions that prioritize convenience over security. This behavior is influenced by cognitive biases and the pressure to meet performance goals.
A strong security culture balances responsiveness with skepticism. For instance, encouraging employees to verify suspicious emails can prevent many attacks. In the example, the company failed to enforce MFA and neglected security patches. Their culture prioritized convenience, leading to a significant data breach and Senate testimony from its CEO.
Key events affecting your organizational structure could also heighten the risk of human error. For example, with a merger or acquisition, the combination of different tech platforms, systems, and cultural norms could complicate cybersecurity practices.
Conduct thorough due diligence to assess the cybersecurity posture of acquired entities. Develop strategies to maintain security amidst organizational changes, such as standardized protocols and continuous monitoring.
Shortages in cybersecurity staff can impact risk management. Implement 24/7 monitoring using AI and analytics to continuously monitor systems. Prevent cybersecurity and IT team burnout by rotating shifts to ensure adequate rest periods and offering professional development opportunities to keep staff engaged and motivated.
Understanding the cultural and behavioral factors is an important next step, but it doesn’t go far enough. The next step is adoption and implementation by your people.
Providing regular and effective training is a cornerstone of maintaining robust cybersecurity. Engaging methods, such as animated modules, can improve employees' memory and understanding of the material. Implementing analytics to track training effectiveness and employee compliance further strengthens the training program.
Employee training is also important in the context of cyber insurance, as many insurers require organizations to have a baseline level of employee cybersecurity training in place to qualify for coverage. Proof of training can also reduce premium rates. Demonstrating a commitment to cybersecurity through regular training activities indicates to insurers that a business is taking proactive steps to mitigate risks. This proactive approach can lead to lower premium rates as it reduces the likelihood of costly claims.
A cadenced training system and setting a “tone from the top” are great places to start. For example, Risk Strategies conducts monthly cybersecurity training announced by the Chief Information Security Officer (CISO). This executive-led approach has proven effective in fostering a security-conscious culture.
While regular and effective training is important, complement this with robust technical and procedural measures to ensure comprehensive cybersecurity. Some of these measures include:
It’s difficult to know the degree of human error your organization may be exposed to without conducting a cybersecurity and human factors risk assessment. This will help you gauge any gaps in the system and identify areas for proactive improvement. Here are some places to start:
Identify weaknesses in your systems, processes, and human behaviors that could be exploited by cyber criminals. Considerations may include weak passwords, lack of security awareness training, and susceptibility to phishing attacks.
For each identified risk, estimate the likelihood (probability) of it occurring and the potential impact (financial, operational, reputational) if it does. Use a risk scoring system to prioritize the most critical risks that need immediate attention.
Cybersecurity risk assessment tools help businesses identify and manage potential security threats. Popular tools scan for vulnerabilities, assess compliance risks, and analyze networks, applications, and devices to find weaknesses.
Some tools provide ratings based on security performance. Using these tools helps companies protect sensitive data and improve their overall security.
The US regulatory landscape for cybersecurity has become stricter over the last decade. Major laws like the Cybersecurity Information Sharing Act (CISA) encourage sharing threat information. The General Data Protection Regulation (GDPR) impacts US businesses handling European data. The National Institute of Standards and Technology (NIST) framework helps organizations improve their cybersecurity practices. Recently, the Cybersecurity Maturity Model Certification (CMMC) requires defense contractors to meet specific security standards.
Many insurance carriers now require vulnerability scanning before finalizing cyber insurance to ensure that businesses have addressed any potential weaknesses. The assessment is an important step for organizations to take before signing on for cybersecurity insurance.
In addition to assessments and compliance, integrating AI into your cybersecurity strategy can boost your defenses. AI can enhance cybersecurity by detecting phishing attempts, identifying anomalies, and reducing risks. Consider AI as a supplementary tool, providing an additional layer of protection by identifying suspicious activities that we, as humans, might miss.
While AI implementation can be costly, its benefits in preventing breaches could outweigh the initial investment. For example, AI can recognize phishing trends and block suspicious emails, reducing human error and enhancing overall security.
The integration of advanced technologies, continuous improvement in training tools, and evolving cultural practices will continue to shape the future of cybersecurity risk management. Future AI tools will better recognize and block sophisticated threats, further reducing human error.
To effectively defend against cyber threats, focus on building a human firewall. This involves investing in employee training, implementing robust technological measures, and fostering a strong security culture. Stay updated on evolving trends and best practices to ensure your business remains resilient against cyber threats.
Find Allen Blount on LinkedIn.
Connect with Risk Strategies Cyber Risk team at cyber@risk-strategies.com.
The contents of this article are for general informational purposes only and Risk Strategies Company makes no representation or warranty of any kind, express or implied, regarding the accuracy or completeness of any information contained herein. Any recommendations contained herein are intended to provide insight based on currently available information for consideration and should be vetted against applicable legal and business needs before application to a specific client.