{"id":44863,"date":"2022-07-12T21:38:25","date_gmt":"2022-07-13T01:38:25","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=44863"},"modified":"2022-07-13T08:18:06","modified_gmt":"2022-07-13T12:18:06","slug":"hr-on-guard-for-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/hr-on-guard-for-cybersecurity\/44863\/","title":{"rendered":"HR on guard for cybersecurity"},"content":{"rendered":"<p>Did you know you need to enlist the help of a Human Resources expert to successfully combat cyberthreats? Is that a surprise? It shouldn\u2019t be. Sure, there are technical experts who are responsible for cybersecurity on the server, computer and software levels. But the company\u2019s security cannot be ensured by technical measures alone; organizational ones are also needed. In particular, someone needs to train employees to recognize cybercriminals\u2019 tricks and to counter them. This is where the experience and skills of HR specialists can come in handy.<\/p>\n<h2>Why purely technical measures are not enough<\/h2>\n<p>Some might say \u201cthat\u2019s what IT and Infosec specialists are for!\u201d And that\u2019s partly right. The IT or security department probably does everything it can to reduce the risk of an attack and mitigate possible consequences. However, just one human error can nullify most of their efforts. In fact, all employees should keep cybersecurity issues in mind. For any one of them could unintentionally deal the company\u2019s reputation and finances a blow. All they need do is open a malicious attachment, or believe something like a \u201cmessage from the boss\u201d prompting them to transfer money to an unfamiliar account.<\/p>\n<p>Cybercriminals have been <a href=\"https:\/\/www.kaspersky.com\/blog\/mdr-report-contribution\/44584\/\" target=\"_blank\" rel=\"noopener nofollow\">relying on employees\u2019 mistakes and unawareness above all else<\/a> over the past few years. <a href=\"https:\/\/securelist.com\/spam-and-phishing-in-2021\/105713\/\" target=\"_blank\" rel=\"noopener\">Phishing<\/a> has become the most popular means for them to get their hands on confidential data, which involves attempts to trick people into disclosing information using social engineering, spoofed e-mails or fake websites. These days, corporate security depends on every employee, and the company should inform every single one of them about the rules of secure work.<\/p>\n<h2>Why IT and Infosec departments need help in efforts to educate colleagues<\/h2>\n<p>It\u2019s the technical side they\u2019re good at \u2014 working with people usually isn\u2019t a central role in their job descriptions, never mind educating other employees. If you\u2019re good at what you do\u00a0\u2014 it doesn\u2019t necessarily mean you can explain how you do it, especially to people outside the field. What seems obvious to a security expert may not be familiar to a sales manager at all. That\u2019s why a specialist\u2019s instructions and talks are often too difficult to understand and don\u2019t produce the desired results.<\/p>\n<p>In addition, a lecture is generally not the most optimal format for learning. As our experience shows, few people really process information presented in this way. This is like fire safety training \u2014 it seems to be vital, but most perceive it as a formality. Even if someone really listens to the lecturer, in a best-case scenario he probably forgets about 70% of what was said in a couple of days. It is always better to have a training conducted by an HR employee who knows how to convey information to the employee in the right way.<\/p>\n<p>Not to mention that IT and InfoSec teams tend to be overloaded dealing with ongoing routine issues\u00a0\u2014 from forgotten passwords to hundreds of notifications from security solutions, each of which may be a sign of an attack. That means there simply aren\u2019t enough resources for unfamiliar strategic tasks such as security awareness training.<\/p>\n<h2>Your company needs a new hero<\/h2>\n<p>You\u2019ve no doubt got it by now: Human Resources specialists are indispensable in the fight against cyberthreats. An HR expert knows all the ins and outs of corporate training. So who could do a better job at communicating the importance of this mission to management?<\/p>\n<p>And we, for our part, are ready to provide all the resources and means necessary. As part of the <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/security-awareness?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Awareness<\/a> services, we\u2019ve collected a variety of trainings and educational programs for specialists and companies of different levels and experience \u2014 from the basics to highly specialized interactive simulations.<\/p>\n<p>Despite the fact that the topic is not easy, you do not need to be an expert in cybersecurity to arrange trainings. Our specialists have prepared and systematized all the necessary information, and even a person without experience in the field of information security can manage the process.<\/p>\n<p>Our blog can serve as an additional source of information that can help HR specialist learn about the latest cyberthreats and modern approaches to train others to protect against those threats in simple terms. From time to time we <a href=\"https:\/\/www.kaspersky.com\/blog\/interns-as-a-cyberthreat\/44621\/\" target=\"_blank\" rel=\"noopener nofollow\">publish<\/a> posts <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">relevant<\/a> to HR professionals, and we also we plan to publish additional materials that can help HRs make a persuasive case for your management and get support from the IT department.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>The most effective protection is increasing employees&#8217; awareness, and it\u2019s up to HR to maintain it.<\/p>\n","protected":false},"author":2711,"featured_media":44865,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[4032,76,2556],"class_list":{"0":"post-44863","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-hr","10":"tag-phishing","11":"tag-security-awareness"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/hr-on-guard-for-cybersecurity\/44863\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hr-on-guard-for-cybersecurity\/24365\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/hr-on-guard-for-cybersecurity\/19831\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/hr-on-guard-for-cybersecurity\/26753\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/hr-on-guard-for-cybersecurity\/24664\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/hr-on-guard-for-cybersecurity\/25057\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/hr-on-guard-for-cybersecurity\/27407\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/hr-on-guard-for-cybersecurity\/27038\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/hr-on-guard-for-cybersecurity\/33540\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/hr-on-guard-for-cybersecurity\/10865\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/hr-on-guard-for-cybersecurity\/19156\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/hr-on-guard-for-cybersecurity\/19730\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/hr-on-guard-for-cybersecurity\/29038\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/hr-on-guard-for-cybersecurity\/28359\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/hr-on-guard-for-cybersecurity\/25248\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/hr-on-guard-for-cybersecurity\/30730\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/hr-on-guard-for-cybersecurity\/30477\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/security-awareness\/","name":"security awareness"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2711"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=44863"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44863\/revisions"}],"predecessor-version":[{"id":44872,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/44863\/revisions\/44872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/44865"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=44863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=44863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}