{"id":48433,"date":"2023-06-13T12:40:12","date_gmt":"2023-06-13T16:40:12","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=48433"},"modified":"2023-06-13T12:40:12","modified_gmt":"2023-06-13T16:40:12","slug":"cybersecurity-internal-communication","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-internal-communication\/48433\/","title":{"rendered":"The art of internal cybersecurity communications"},"content":{"rendered":"<p>If you ask any infosec expert what causes most incidents, the answer will almost certainly be the human factor. Most attacks on companies succeed because of employees\u2019 inattention, ignorance and mistakes. At the same time, the human factor is the hardest threat to eliminate, because you\u2019re dealing not with obedient information systems, but living, breathing people.<\/p>\n<p>Our tips often include communicating some information to employees. But this is easier said than done. So today, we\u2019ll talk about how to get employees to take cybersecurity more seriously and heed the advice of security specialists.<\/p>\n<h2>Why employees ignore cybersecurity<\/h2>\n<p>The problem is that cybersecurity isn\u2019t a priority issue for most company staff. They have their own job to do, and may simply not have the time for what they see as secondary matters. Therefore, it\u2019s important to realize and accept two facts.<\/p>\n<p>First: for a typical employee, information security is a secondary issue. So don\u2019t expect an email about the dangers of reusing passwords to cause an avalanche of password changes, or a memo about downloading dubious attachments to stop the practice dead in its tracks.<\/p>\n<p>Second: be aware that employees for whom cybersecurity is not at the forefront of their mind might not (or probably won\u2019t) understand what you\u2019re talking about. For a security pro, phrases like \u201ctargeted attack using spear phishing\u201d don\u2019t contain any complex information. But to the regular employee in sales, accounts or logistics, you might as well be speaking Klingon.<\/p>\n<p>These two facts together often lead infosec experts to the conclusion that the task is unsolvable, so they give up and limit themselves to security measures that relate solely to hardware and software. But this is of course not just wrong but dangerous. The question arises: how to get through to employees?<\/p>\n<h2>Cybersecurity + communications = \u2764\ufe0f<\/h2>\n<p>The good news is that your company most likely already has all the ingredients in place to establish good communications about information security. You probably have security experts who understand threats and how to stop them. And you likely have communication experts \u2014 usually found in HR or, even better, in the internal communications department (if you have one).<\/p>\n<p>Be prepared that at first it won\u2019t be easy: such experts are unlikely to be well-versed in cybersecurity, and probably won\u2019t be burning with desire to delve into the details. But don\u2019t give up: you need to find among them the most suitable candidate for, so to speak, evangelism.<\/p>\n<p>Ideally, it should be an already tech-savvy person. If there\u2019s no one in-house, try hiring a new employee who knows internal communications and has a technical background. Such people are rare, but you may get lucky.<\/p>\n<p>When you find them, first, upgrade their cybersecurity skills \u2014 teach them to look at the world through the prism of information security. Our interactive <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> is just what you need \u2014 it even provides a free trial training.<\/p>\n<p>The essential ingredient of the entire undertaking is trust. IT guys in general, and infosec pros in particular, are notoriously control freaks. So here they\u2019ll have to tame their instincts and let the communication experts do their job where it relates to communication with employees.<\/p>\n<h2>Where to start<\/h2>\n<p>The internal communications department (if none exists, then HR) will usually have a good idea of which employees do what and how. Therefore, if you outline the general range of threats in a way that your counterpart can understand, they should be able to develop the appropriate communications strategy \u2014 that is, determine what risks certain departments are exposed to, and what to explain to employees in specific fields as a priority.<\/p>\n<p>Another useful thing that you and your new ally can do is to create an easy-to-read <a href=\"https:\/\/www.kaspersky.com\/blog\/security-awareness-basic-instruction\/40416\/\" target=\"_blank\" rel=\"noopener nofollow\">information security guide for new employees<\/a>.<\/p>\n<p>Don\u2019t expect instant success. Overcoming the misunderstanding phase will be a challenge. I highly recommend listening to this <a href=\"https:\/\/www.kaspersky.com\/blog\/rsa2020-security-awareness-nypd\/33960\/\" target=\"_blank\" rel=\"noopener nofollow\">informative talk<\/a> by former NYPD Cyber Intelligence and Investigations chief Nick Selby about raising awareness of cybersecurity among NYPD officers (spoiler: it wasn\u2019t easy). I\u2019ll share some of his tips about how to organize the process:<\/p>\n<ul>\n<li><strong>Keep it simple.<\/strong> At the heart of the NYPD campaign were simplicity and specificity, which helped a lot.<\/li>\n<li><strong>Empower people.<\/strong> It\u2019s important to have well-oiled communications on security issues in the team, and for employees to understand what actions to take in a particular case. This is so that our aforementioned salesperson or other regular employee knows who to go to with a suspicious email, thereby preventing a hack of the company.<\/li>\n<li><strong>Show results.<\/strong> It\u2019s a good idea to show how working together produces a positive result. For example, from time to time you can email out an internal memo about attacks that were prevented, and reward employees who helped in this.<\/li>\n<\/ul>\n<p>Again, a series of interactive trainings can be a good starting point to instill in employees cybersecurity\u2019s importance, to give them advice and recommendations, and to raise awareness of security requirements and restrictions.<\/p>\n<p>As said above, our <a href=\"https:\/\/k-asap.com\/en\/?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a> is the perfect solution. Your new corporate communications ally can act as administrator of these trainings, and use them to scale up awareness of threats and protection practices throughout the company.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>A few tips on how to establish cybersecurity communications with employees.<\/p>\n","protected":false},"author":2726,"featured_media":48434,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051],"tags":[2507,4430,1146,1795],"class_list":{"0":"post-48433","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-awareness","10":"tag-kaspersky-asap","11":"tag-risks","12":"tag-training"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-internal-communication\/48433\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cybersecurity-internal-communication\/25800\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cybersecurity-internal-communication\/21241\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cybersecurity-internal-communication\/28494\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-internal-communication\/26099\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cybersecurity-internal-communication\/35554\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cybersecurity-internal-communication\/26418\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-internal-communication\/32109\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-internal-communication\/31792\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/awareness\/","name":"awareness"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=48433"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48433\/revisions"}],"predecessor-version":[{"id":48437,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/48433\/revisions\/48437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/48434"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=48433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=48433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=48433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}