🔆 How to Encourage Employees to Take Cyber Risks Seriously Gartner calls for a patriotic approach by recalling 1942 — not in a political sense, but to make security compliance a norm within organizations. During World War II, the U.S. promoted secrecy with posters like "Loose lips sink ships," a slogan that effectively highlighted the dire consequences of breaching security protocols. Researchers recommend making the perception of cyber risk more tangible and real, motivating employees to avoid these risks and using cultural and social levers to normalize such behavior. Many organizational cybersecurity programs prioritize awareness and the ability to identify cyber-risks. However, the issue isn't just awareness — Gartner's survey shows that 74% of employees are willing to knowingly violate security policies to achieve business goals. Why? One of the top reasons: there are no consequences! To make secure behavior a socially encouraged norm within organizations, five tactics are recommended: 1. Connect behavior to its consequences (both negatively and positively, when following best security practices simplifies employees' life). 2. Link "cyber-safe" behavior to already respected organizational values and norms (such as workplace safety in manufacturing companies and account confidentiality in financial institutions). 3. Heighten the perception of cyber risk consequences through social pressure and potential harm to colleagues. 4. Illustrate risk realization through the personal misfortunes and damages to employees, such as the high cost of mitigating a serious cyber incident affecting organizational performance and reducing everyone's bonuses. 5. Use humor to make any appeals and examples more memorable. Each tactic in the study is accompanied by examples, though their somewhat contrived nature illustrates the challenge of applying such approaches in practice and the importance of tailoring them to the specific domain and culture of an organization. Of course, Gartner wouldn't be Gartner without a magic quadra... chart, so managing "human" risks is visualized in the diagram below. Read the research at Gartner's website: https://lnkd.in/dwzEUwTM (paywalled) Full version: https://lnkd.in/dFbNY4wv
Kaspersky
Seguridad de redes y sistemas informáticos
Stadtkreis 1 Altstadt, Zurich 436.727 seguidores
Kaspersky. Bring on the Future.
Sobre nosotros
Our mission is simple – building a safer world. And in fulfilling that mission we aim to become the global leader in cybersecurity – by securing technology to make sure that the possibilities it brings become opportunities for each and every one of us. Bring on endless possibilities. Bring on a safer tomorrow.” - Eugene Kaspersky, CEO of Kaspersky https://www.kaspersky.com/about/company
- Sitio web
-
https://kaspersky.com/
Enlace externo para Kaspersky
- Sector
- Seguridad de redes y sistemas informáticos
- Tamaño de la empresa
- De 5.001 a 10.000 empleados
- Sede
- Stadtkreis 1 Altstadt, Zurich
- Tipo
- De financiación privada
- Fundación
- 1997
Ubicaciones
Empleados en Kaspersky
-
Riccardo de Rinaldini
Head of Global Consumer Marketing at Kaspersky
-
Leonid Efremov
Senior DevOps Engineer
-
Siang Tiong (姚祥忠) YEO
I understand the cultural differences between various Asian and Western countries, I formulate strategies and operationalise it | APAC Leader |…
-
David Emm
Actualizaciones
-
Enjoy features like automated response and event chain detection. Discover Kaspersky Anti Targeted Attack ⇒ https://kas.pr/4q4b
-
Simplify Your Network with Kaspersky SD-WAN! Effortlessly connect new locations, control your network from one console, cut costs, and ensure top security with automated traffic management. Scale up, stay secure, and optimize your network with ease! Find out more here: https://kas.pr/nk2u
-
Our experts have uncovered an active malicious campaign exploiting popular software like Foxit PDF Editor, AutoCAD, and JetBrains. The attackers deploy stealer malware to capture victims' credit card data and device details, while also covertly running crypto mining operations on infected systems. Read our full report: https://lnkd.in/dah7MGcf #CyberSecurity #Cryptocurrency #malware
-
While discussing the rollout of SIEM with many IT and cybersecurity professionals, we still encounter skepticism rooted in bad experiences with earlier generations of SIEM systems. Therefore, we asked Evgenia Lagutina, who has spent 10 years familiarizing herself with SIEM as a customer, integrator, and vendor, to describe the main misconceptions about these products and debunk them. Swipe through our cards to discover top misconceptions and practical experiences! Try the modern SIEM, Kaspersky Unified Monitoring and Analysis Platform, via this link: https://kas.pr/j66s
-
Kaspersky Security Center takes the complexity out of IT security administration and systems management. Learn more with our comprehensive Q&As for Security Center: https://kas.pr/o9ur #Kaspersky #KasperskySecurityCenter #Cybersecurity
-
We believe in the power of collaboration to combat cybercrime. That's why we joined forces with INTERPOL for Operation Synergia II, targeting threats like phishing, ransomware, and info stealers. This global effort, spanning 95 countries and involving private-sector partners, led to identifying over 100 suspects and arresting 41. Building on the success of the first phase in late 2023, this latest operation, which ran from April to August 2024, helped identify about 30,000 suspicious IPs and servers. Over 75% were taken down, and law enforcement seized 59 servers and 43 devices connected to cybercriminal activity. Read More: https://kas.pr/q1x6
-
🤖 Holistic approach to AI risks Google has refined its Secure AI Framework and launched a website that provides an overview of AI risks throughout the AI lifecycle — from data collection and model training to everyday usage. https://saif.google/ The risk map offers a topic overview, and the resources section only lists research from Google's team. However, the Secure AI development primer is a genuinely valuable introductory course. We recommend focusing on the Risks and Controls subsections, which, though presented at a high level, serve as a useful checklist for managing AI risks. The self-assessment section includes a short questionnaire to receive a personalized list of prioritized risks for your company's specific situation. https://lnkd.in/d37pPbjw #AI #tips #cybersecurity
-
🚓 Interlock Encrypts FreeBSD Servers Since late September, a new group called Interlock has been targeting FreeBSD servers with ransomware attacks. This is unusual, as ransomware typically targets Linux and ESXi. The group's arsenal also includes more typical malware for Windows. Their tactics follow the traditional approach of double extortion, threatening to publish data while encrypting the infrastructure. Six victims are currently listed on their leak site. https://lnkd.in/gRNn_yVk #threats #ransomware #news #cybersecurity
-
🎓 Exciting News from Kaspersky in Egypt! 🎓 After an engaging event with Misr University for Science & Technology, where we shared insights on the latest cybersecurity trends and offered career advice to the next generation of cybersecurity students, we’re thrilled to announce the signing and launch of the very first Kaspersky Academy in Egypt! 🇪🇬 Together, we’re shaping the future of cybersecurity education. Stay tuned for more updates! #KasperskyAcademy #CybersecurityEducation #FutureofTech #Kaspersky #Egypt